AVR411: Secure Rolling Code Algorithm for Wireless Link

ثبت نشده
چکیده

● Uses advanced encryption standard (AES) and its cipher-based message authentication code (CMAC) mode of operation for transmitter authentication ● 128, 192 or 256 Bit key sizes supported ● Uses sleep modes for low-power consumption ● Less than 30ms response time ● PC command-line tools for cryptographic key management ● Multiple transmitters supported ● Secure learning mechanism for introducing new transmitters

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Improving Long PN-Code Acquisition in the Presence of Doppler Frequency Shifts

Wireless communication is the major form of connection nowadays. In most cases it exploits the benefits of the spread spectrum techniques to overcome channel introduced corruptions like Doppler residual frequency, noise, interference and jamming. These techniques also enhance the security and quality of the link. Using long spreading pseudo-noise codes provides further security for the link tho...

متن کامل

Energy Efficient Reliable Routing Algorithms for Wireless Ad-hoc Network

To address the problem of energy efficient reliable routing in wireless networks in the presence of unreliable communication links or devices or lossy wireless link layers by integrating the power control techniques into the energy efficient routing. This work deals with the problem of energy-efficient reliable wireless communication in the presence of unreliable or loss wireless link layers in...

متن کامل

Efficient Path Key Establishment for Wireless Sensor Networks

Key predistribution schemes have been proposed as means to overcome wireless sensor network constraints such as limited communication and processing power. Two sensor nodes can establish a secure link with some probability based on the information stored in their memories, though it is not always possible that two sensor nodes may set up a secure link. In this paper, we propose a new approach t...

متن کامل

Source Authentication for Code Dissemination Supporting Dynamic Packet Size in Wireless Sensor Networks †

Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011