نتایج جستجو برای: rekeying

تعداد نتایج: 186  

2006
Attila Altay Yavuz Fatih Alagöz Emin Anarim

Mobile Ad-hoc networks (MANETs), providing infrastructure-free wireless instant communication, play important role in tactical military networks. However, providing security in tactical military MANETs, having very large and dynamic structure without infrastructure support in hostile environments, is a very difficult task. In order to address security problems in tactical military MANETs, we pr...

2014
S.Raja Rajeshwari

Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploitin...

2011
C. O. Allen

Wireless sensor networks (WSN) is tending towards becoming a complete solution in communication protocols, embedded systems and low-power implementations. However, the resource constraints which includes, limited communication range, limited energy, limited computing power, limited bandwidth and the fear of intruders have limited the WSN applications. Since lightweight computational nodes that ...

Journal: :Int. J. Satellite Communications Networking 2008
Roberto Di Pietro Stefano Iannitti

Cryptography is the most suitable technique to protect the access to subscribed value-added services for mobile applications provided through satellite broadcasting (e.g. localization and mobile TV). However, if a temporary loss of signal is experienced by receivers, not only the data streaming is compromised, but also the key management-related messages. Hence, when the signal is received agai...

2016
Walid Elgenaidi Thomas Newe Eoin O'Connell Daniel Toal Gerard Dooly

There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, includi...

2001
B. DeCleene L. Dondeti S. Griffin T. Hardjono D. Kiwior J. Kurose D. Towsley S. Vasudevan C. Zhang

In this paper we consider the problem of key management in a highly-mobile wireless networking environment, such as a dynamic, distributed setting in which command and control nodes move along with individual users. In this scenario, data must be securely multicast from one source to many users, requiring that users be properly keyed. Furthermore, because users move in and out of the session (d...

2013
Depeng Li Zeyar Aung Srinivas Sampalli John Williams Abel Sanchez

Privacy preservation is a crucial issue for smart buildings where all kinds of messages, e.g., power usage data, control commands, events, alarms, etc. are transmitted to accomplish the management of power. Without appropriate privacy protection schemes, electricity customers are faced with various privacy risks. Meanwhile, the natures of smart grids and smart buildings—such as having limited c...

Journal: :Journal of Systems Architecture - Embedded Systems Design 2008
Sascha Mühlbach Sebastian Wallner

The protection of the microcomputer bus system in embedded devices is essential to prevent eavesdropping and the growing number of todays hardware hacking attacks. This contribution presents a hardware solution to ensure microcomputer bus systems via the Tree Parity Machine Rekeying Architecture (TPMRA). For this purpose a scalable TPMRA IP-core is designed and implemented in order to meet adap...

2002
Roberto Di Pietro Luigi V. Mancini Sushil Jajodia

A wireless sensor network can be seen as a large number (hundreds of thousand) of small (a few cubic millimetres) devices, battery powered, with very limited hardware resources. Such a network has been studied specifically in the ad hoc model, where the sensors autonomously set up a network infrastructure. We propose here an extension to the current wireless ad hoc sensor network (WSN) model (i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید