Reversible Multiple Items Authentication Scheme for WSNs
نویسندگان
چکیده
منابع مشابه
An authentication scheme for locating compromised sensor nodes in WSNs
Wireless sensor networks have recently emerged as a promising computing model for many civilian and military applications. Sensor nodes in such a network are subject to varying forms of attacks since they are left unattended after deployment. Compromised nodes can, for example, tamper with legitimate reports or inject false reports in order to either distract the user from reaching the right de...
متن کاملReversible Image Authentication Scheme for VQ Images Using Codebook Clustering
The paper presented a reversible image authentication scheme for VQ images using codebook clustering. The proposed method not only locates the alterations of VQ images but also recover the indexes of VQ image without any distortion from the marked VQ indexes after the hidden authentication bits have been extracted. The method uses the codebook clustering to generate four fixed-size small codebo...
متن کاملA novel reversible image authentication scheme for digital images
Image authentication is to protect the image integrity when the digital image is illegally modified. Most of the image authentication schemes proposed so far employed the irreversible data hiding approach to embed the authentication data into the cover images. In this paper, a novel reversible image authentication scheme for digital images is proposed. In the proposed scheme, the authentication...
متن کاملA Reversible Image Authentication Scheme Based on Chaotic Fragile Watermark
Although a variety of watermark-based image authentication schemes have been proposed so far, most of them have to leave some permanent distortions in the original image for embedding the watermark information. In this paper, we propose a novel reversible image authentication scheme to allow complete recovery of the cover image after the extraction of the embedded watermark. In the embedding pr...
متن کاملComments on He et al.’s Robust Biometric-based User Authentication Scheme for WSNs
In order to guarantee secure communication for wireless sensor networks (WSNs), many user authentication schemes have successfully drawn researchers’ attention and been studied widely. In 2012, He et al. proposed a robust biometric-based user authentication scheme for WSNs. However, this paper demonstrates that He et al.’s scheme has some drawbacks: poor reparability problem, user impersonation...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.3036383