搜索结果: 1-15 共查到“军事学 Sensor Networks”相关记录29条 . 查询时间(0.093 秒)
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
conditional privacy-preserving vehicular sensor networks
2016/7/15
Secure aggregate signature schemes have attracted more concern due to their wide application in resource constrained environment. Recently, Horng et al. [S. J. Horng et al., An efficient certificatele...
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
cryptographic protocols wireless sensor networks
2016/1/26
Recently, Shm et al. Proposed an efficient identity-based broadcast authentication
scheme based on Tso et al.’s IBS scheme with message recovery to achieve security
requirements in wireless sensor n...
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
Key establishment bilinear pairings Session key
2016/1/26
The article proposes one-pass authenticated key establishment protocol
in random oracles for Wireless Sensor Networks. Security of the protocol relies on
Computational Diffie-Hellman Problem on Bili...
Resilient Aggregation in Simple Linear Sensor Networks
wireless sensor network resilient aggregation linear network
2016/1/23
A sensor network is a network comprised of many small, wireless, resourcelimited nodes that sense data about their environment and report readings to a base station. One technique to conserve power ...
Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks
Hybrid Anomaly Misdirection Blackhole
2016/1/7
Security is the biggest concern in Wireless Sensor Networks (WSNs)
especially for the ones which are deployed for military applications and
monitoring. They are prone to various attacks which degrad...
Pairing Based Mutual Healing in Wireless Sensor Networks
Wireless sensor networks Mutual healing Bi-linear Pairing
2015/12/30
In Wireless Sensor Networks(WSNs), a group of users communicating on an unreliable wireless channel can use a group secret. For each session, group manager broadcasts a message containing some keying ...
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
Sensor Networks Key Establishment
2014/3/6
The article proposes a provably secure authenticated multiple key establishment protocol for Wireless Sensor Network. Security of the protocol is based on the computational infeasiblity of solving Ell...
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks
Cryptanalysis Cryptographic Authentication Network Security
2014/3/6
In 2012, Alagheband and Aref presented a dynamic and secure key manage ment model for hierarchical heterogeneous sensor networks. They proposed a signcryption algorithm which is the main building bloc...
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
secret-key cryptography
2014/3/12
For security applications in wireless sensor networks (WSNs), choosing best algorithms in terms of energy-efficiency and of small memory requirements is a real challenge because the sensor networks mu...
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks
cryptographic protocols / key distribution protocols
2012/3/29
There have been numerous recent proposals for key predistribution schemes for wireless sensor networks based on various types of combinatorial structures such as designs and codes. Many of these schem...
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks
cryptographic protocols / Wireless sensor networks key management key predistribution expander graphs
2012/3/23
Providing security for a wireless sensor network composed of small sensor nodes with limited battery power and memory can be a non-trivial task. A variety of key predistribution schemes have been prop...
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
authentication security elliptic curve cryptosystem wireless sensor network
2011/6/9
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to their un-attended and hostile deployments. Usually, sensor nodes are equipped with limited computing...
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks
Combinatorial Key Predistribution Schemes Sensor Networks
2011/2/23
There have been numerous recent proposals for key predistribution schemes for wireless sensor networks based on various types of combinatorial structures such as designs and codes. Many of these schem...
Improvement of Das’s Two-Factor Authentication Protocol in Wireless Sensor Networks
Wireless sensor network authentication password smart card
2009/12/29
User authentication is essential for customized services
and privileged access control in wireless sensor network. In
2009, Das proposed a novel two-factor authentication scheme for
wireless sensor...
Three Improved Algorithms for Multi-path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission
sensor network key establishment secure message transmission
2009/9/2
In this paper, we propose a security model to capture active attacks against multi-path key establishment (MPKE) in sensor networks. Our model strengthens previous models to capture more attacks and a...