نتایج جستجو برای: rekeying
تعداد نتایج: 186 فیلتر نتایج به سال:
Mobile Ad-hoc networks (MANETs), providing infrastructure-free wireless instant communication, play important role in tactical military networks. However, providing security in tactical military MANETs, having very large and dynamic structure without infrastructure support in hostile environments, is a very difficult task. In order to address security problems in tactical military MANETs, we pr...
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploitin...
Wireless sensor networks (WSN) is tending towards becoming a complete solution in communication protocols, embedded systems and low-power implementations. However, the resource constraints which includes, limited communication range, limited energy, limited computing power, limited bandwidth and the fear of intruders have limited the WSN applications. Since lightweight computational nodes that ...
Cryptography is the most suitable technique to protect the access to subscribed value-added services for mobile applications provided through satellite broadcasting (e.g. localization and mobile TV). However, if a temporary loss of signal is experienced by receivers, not only the data streaming is compromised, but also the key management-related messages. Hence, when the signal is received agai...
There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, includi...
In this paper we consider the problem of key management in a highly-mobile wireless networking environment, such as a dynamic, distributed setting in which command and control nodes move along with individual users. In this scenario, data must be securely multicast from one source to many users, requiring that users be properly keyed. Furthermore, because users move in and out of the session (d...
Privacy preservation is a crucial issue for smart buildings where all kinds of messages, e.g., power usage data, control commands, events, alarms, etc. are transmitted to accomplish the management of power. Without appropriate privacy protection schemes, electricity customers are faced with various privacy risks. Meanwhile, the natures of smart grids and smart buildings—such as having limited c...
The protection of the microcomputer bus system in embedded devices is essential to prevent eavesdropping and the growing number of todays hardware hacking attacks. This contribution presents a hardware solution to ensure microcomputer bus systems via the Tree Parity Machine Rekeying Architecture (TPMRA). For this purpose a scalable TPMRA IP-core is designed and implemented in order to meet adap...
A wireless sensor network can be seen as a large number (hundreds of thousand) of small (a few cubic millimetres) devices, battery powered, with very limited hardware resources. Such a network has been studied specifically in the ad hoc model, where the sensors autonomously set up a network infrastructure. We propose here an extension to the current wireless ad hoc sensor network (WSN) model (i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید