Secure Membership Protocol for ZigBee Network
نویسندگان
چکیده
منابع مشابه
Secure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملA Secure Network Access Protocol (SNAP)
Both the size, and the interconnectivity of computer networks are increasing tremendously. However, the possibility of an attack compromising the network is also increasing, making network security critical. Strong authentication protocols are needed to restrict network access to only authorised users. Most existing protocols for authentication and network access are based on centralised authen...
متن کاملEnergy Aware Routing Protocol For Zigbee Networks
Wireless ADHOC networks are self organized dynamic networks can share wireless channel without any established central control standard for IEEE 802.11. The most common protocols are AODV, DSDV, DSR, IRAODV in ADHOC used to ensure the data transmission among them selves. To meet the need of low power and low cost IEEE 802.15.4 standard was developed for sensor networks. In this paper we focus h...
متن کاملEfficient Secure Clustering Protocol for Mobile Ad-hoc Network
A Mobile ad hoc Network is an autonomous network comprised of free roaming nodes which communicate wireless by radio transmission. MANETs are already ubiquitous and their range of use will spread in the near future. In this thesis proposed an efficient dynamic clustering protocol for MANET. In our dynamic clustering protocol have five state interactions. These are un-clustered state, orphan sta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2013
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2013.23.3.405