搜索结果: 1-15 共查到“军事学 Wireless Sensor Networks”相关记录17条 . 查询时间(0.097 秒)
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
cryptographic protocols wireless sensor networks
2016/1/26
Recently, Shm et al. Proposed an efficient identity-based broadcast authentication
scheme based on Tso et al.’s IBS scheme with message recovery to achieve security
requirements in wireless sensor n...
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
Key establishment bilinear pairings Session key
2016/1/26
The article proposes one-pass authenticated key establishment protocol
in random oracles for Wireless Sensor Networks. Security of the protocol relies on
Computational Diffie-Hellman Problem on Bili...
Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks
Hybrid Anomaly Misdirection Blackhole
2016/1/7
Security is the biggest concern in Wireless Sensor Networks (WSNs)
especially for the ones which are deployed for military applications and
monitoring. They are prone to various attacks which degrad...
Pairing Based Mutual Healing in Wireless Sensor Networks
Wireless sensor networks Mutual healing Bi-linear Pairing
2015/12/30
In Wireless Sensor Networks(WSNs), a group of users communicating on an unreliable wireless channel can use a group secret. For each session, group manager broadcasts a message containing some keying ...
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
Sensor Networks Key Establishment
2014/3/6
The article proposes a provably secure authenticated multiple key establishment protocol for Wireless Sensor Network. Security of the protocol is based on the computational infeasiblity of solving Ell...
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
secret-key cryptography
2014/3/12
For security applications in wireless sensor networks (WSNs), choosing best algorithms in terms of energy-efficiency and of small memory requirements is a real challenge because the sensor networks mu...
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks
cryptographic protocols / Wireless sensor networks key management key predistribution expander graphs
2012/3/23
Providing security for a wireless sensor network composed of small sensor nodes with limited battery power and memory can be a non-trivial task. A variety of key predistribution schemes have been prop...
Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
authentication security elliptic curve cryptosystem wireless sensor network
2011/6/9
Authenticating remote users in wireless sensor networks (WSN) is an important security issue due to their un-attended and hostile deployments. Usually, sensor nodes are equipped with limited computing...
Improvement of Das’s Two-Factor Authentication Protocol in Wireless Sensor Networks
Wireless sensor network authentication password smart card
2009/12/29
User authentication is essential for customized services
and privileged access control in wireless sensor network. In
2009, Das proposed a novel two-factor authentication scheme for
wireless sensor...
Key Predistribution Techniques for Grid-Based Wireless Sensor Networks
Key predistribution wireless sensor networks symmetric key management
2009/6/11
We consider symmetric key predistribution in grid-based wireless
sensor networks. Networks consisting of wireless sensor nodes arranged
in a grid pattern have many useful applications, including env...
Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes
Group-based deployment key predistribution wireless sensor networks
2009/6/9
Recent literature contains proposals for key predistribution schemes for sensor networks in which
nodes are deployed in separate groups. In this paper we consider the implications of group deployment...
Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks
Wireless Sensor Networks Key Pre-distribution Key Management
2009/6/9
S. J. Choi and H. Y. Youn proposed a key pre-distribution scheme forWireless Sensor Networks based on LU
decomposition of symmetric matrix, and later many researchers did works based on this scheme. ...
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary
Unattended WSN data survival security
2009/6/5
Some sensor network settings involve disconnected or unattended operation with
periodic visits by a mobile sink. An unattended sensor network operating in a
hostile environment can collect data that...
Authenticated Interleaved Encryption and its Application to Wireless Sensor Networks
Authenticated Interleaved Encryption Wireless Sensor Networks
2008/12/31
We present AIE (Authenticated Interleaved Encryption),
a new scheme that allows nodes of a network to exchange
messages securely (i.e. encrypted and authenticated) without
sharing a common key or u...
The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks
Wireless networking security protocols cryptography key
2008/9/22
Wireless sensor nodes generally face serious limitations in
terms of computational power, energy supply, and network
bandwidth. Therefore, the implementation of effective and
secure techniques for ...