نتایج جستجو برای: broadcast authentication

تعداد نتایج: 63999  

Gh. Farsi H. Khanmirzaei V. Asgari Azad

Broadcast and broadband communications have undoubt- edly become a part of today’s social life. Accessibility of content of interest to the audience at any place and at any time regardless of the type of content consumer device can have an effective contribution to the desire of the audience to use of the broadcast content. The HD and Ultra HD qualities, the desire for demand-driven application...

Journal: :EURASIP J. Wireless Comm. and Networking 2011
Vijay Sivaraman Diethelm Ostry Jaleel Shaheen Antoni Junior Hianto Sanjay Jha

Broadcast is used in wireless sensor networks for operations such as software updates, network queries, and command dissemination. Though authentication of broadcast messages is probably the most critical primitive, certain applications such as battlefield control and natural resource management also require the broadcast data to be kept secret from eavesdroppers. In this paper we design, imple...

2003
Mathias Bohge Wade Trappe

In the near future wireless networks will consist of lowpowered, compute-constrained devices. These devices will have limited ability to perform the expensive computational operations associated with public key cryptography. This will limit the usefulness of conventional authentication mechanisms based on public key certificates in these domains. In this paper we introduce an alternative to con...

Journal: :CoRR 2015
Xiaofu Wu Zhen Yan Cong Ling Xiang-Gen Xia

The broadcast nature of radio propagation makes wireless networks vulnerable to eavesdropping attacks. To enhance authentication strength in wireless networks, various physical layer authentication schemes were proposed by exploiting physical layer characteristics. Recently, we proposed a novel PHYsical layer Phase Challenge-Response Authentication Scheme (PHY-PCRAS), which exploits both the re...

Journal: :IEEE Transactions on Information Forensics and Security 2022

Backscatter communication (BC) enables ultra-low-power communications and allows devices to harvest energy simultaneously. But its practical deployment faces severe security threats caused by nature of openness broadcast. Authenticating backscatter (BDs) is treated as the first line defense. However, complex cryptographic approaches are not desirable due limited computation capability BDs. Exis...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید