New Security Approach for ZigBee Weaknesses
نویسندگان
چکیده
منابع مشابه
a new approach to credibility premium for zero-inflated poisson models for panel data
هدف اصلی از این تحقیق به دست آوردن و مقایسه حق بیمه باورمندی در مدل های شمارشی گزارش نشده برای داده های طولی می باشد. در این تحقیق حق بیمه های پبش گویی بر اساس توابع ضرر مربع خطا و نمایی محاسبه شده و با هم مقایسه می شود. تمایل به گرفتن پاداش و جایزه یکی از دلایل مهم برای گزارش ندادن تصادفات می باشد و افراد برای استفاده از تخفیف اغلب از گزارش تصادفات با هزینه پائین خودداری می کنند، در این تحقیق ...
15 صفحه اولSecurity Weaknesses in Bluetooth
We point to three types of potential vulnerabilities in the Bluetooth standard, version 1.0B. The first vulnerability opens up the system to an attack in which an adversary under certain circumstances is able to determine the key exchanged by two victim devices, making eavesdropping and impersonation possible. This can be done either by exhaustively searching all possible PINs (but without inte...
متن کاملVehicle Security System Using Zigbee
The first car been stolen was reported in 1896. Since then, car safety tools and after that car security system faced a fast rapid development. The security system has become one of the key factors in car manufacturing as the demand from the buyer. The main objective of this project is to secure and monitor the car based on combination of Zigbee system, Peripheral Interface Controller (PIC) 16F...
متن کاملStudying Security Weaknesses of Android System
As smartphones are generalized, various technologies and services have been introduced and are in wide use. From simply using calling or texting services, Internet banking and transaction system that require sensitive personal information emerged. Google’s Android, one of the representative OS of smartphones, was developed based on an open source, having various weaknesses and exposed to securi...
متن کاملSecurity Weaknesses in Two Certificateless Signcryption Schemes
Recently, a certificateless signcryption scheme in the standard model was proposed by Liu et al. in [1]. Another certificateless signcryption scheme in the standard model was proposed by Xie et al. in [2]. Here, we show that the scheme in [1] and [2] are not secure against Type-I adversary. 1 Certificateless Signcryption Scheme by Liu et al.[1] 1.1 Review of the Scheme In this section, we revie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2014
ISSN: 1877-0509
DOI: 10.1016/j.procs.2014.08.056