Joint Fingerprinting and Encryption in the DWT Domain for Secure M2M Communication
نویسندگان
چکیده
منابع مشابه
Joint Fingerprinting and Encryption in the DWT Domain for Secure M2M Communication
Machine-to-machine (M2M) communication is viewed as one of the next frontiers in wireless communications. Because of unguarded communication, new security threats emerge. Considering that multimedia will be widely used in various applications over M2M network, it is very urgent to meet new security requirements for multimedia communication. This paper focuses on a joint fingerprinting and encry...
متن کاملCooperative Architecture for Secure M2M Communication
This paper presents a cooperative architecture for M2M system security to enable M2M nodes to interface with intelligent devices sensing realworld conditions and control physical devices. We also present performance results of our cooperative architecture that shows that our security scheme is capable of reliably handling concurrent events generated by different types of M2M devices to achieve ...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملJoint Fingerprinting/Encryption for Medical Image Security
Electronic health records (EHRs) facilitates the healthcare process. However, it can also cause serious security and privacy problems. While various conventional encryption mechanisms can solve some aspects of these problems, they cannot address the illegal distribution of decrypted medical images. To protect decrypted medical images from being illegally distributed by an authorized staff membe...
متن کاملLow delay and secure M2M communication mechanism for eHealthcare
Currently, the eHealthcare information management is the most critical and hot research topic. Especially with the involvement of new and promising telecommunication technologies like Machine to Machine (M2M) Communication. In M2M communication the devices interact and exchange information with each other in an autonomous manner to accomplish the required tasks. Mostly machine communicate to an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2016
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2016.10.1.13