نتایج جستجو برای: authentication protocol

تعداد نتایج: 275892  

Journal: :I. J. Network Security 2018
Debsmita Ghosh Celia Li Cungang Yang

Smart grids allow automated meter readings and facilitate two-way communications between the smart meters and utility control centers. As the smart grid becomes more intelligent, it becomes increasingly vulnerable to cyberattacks. Smart grid security mainly focuses on mutual authentication and key management techniques. An impeding factor in grid security is the memory and processing constraint...

2016
Jong J. Lee Youn-Sik Hong Ki Young Lee

Authentication is a communication protocol processing procedure. In the Internet of Things, secure communication should be constructed between one "thing" and another by such a procedure. The identity that the second "thing" or object claims should be consistent with what the first one claims. Claimed identity information becomes a single message. Based on this message, we verify the identity o...

2017
Younsung Choi

Das first proposed two-factor authentication combining the smart card and password to resolve the security problems of wireless sensor networks (WSNs). After that, various researchers studied twofactor authentication suitable for WSNs. In user authentication protocols based on the symmetric key approach, a number of elliptic curve cryptography (ECC)-based authentication protocols have been prop...

2003
A. F. Al Shahri D. G. Smith J. M. Irvine

Both the size, and the interconnectivity of computer networks are increasing tremendously. However, the possibility of an attack compromising the network is also increasing, making network security critical. Strong authentication protocols are needed to restrict network access to only authorised users. Most existing protocols for authentication and network access are based on centralised authen...

Journal: :Computers & Security 2005
Yacine Challal Abdelmadjid Bouabdallah Hatem Bettahar

Many applications, such as broadcasting stock quotes and video-conferencing require data source authentication of the received multicast traffic. Multicast data source authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data are likely to be important i...

2007
JIANG Jun

In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial pro...

2012
Kamarularifin Abd Jalil Qatrunnada Binti Abdul Rahman

The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such environment are said to be exposed to attacks such as identity impostor, man-in-the-middle attacks and also unauthorized attacks. Thus, this has created skeptical among the users and has resulted them of k...

Journal: :J. Inf. Sci. Eng. 2007
Keun-Ho Lee Sang-Bum Han Heyi-Sook Suh Chong-Sun Hwang SangKeun Lee

Ad hoc networks are much more vulnerable to security attacks than wired networks or infrastructure-based wireless networks. Secure communication is very important in mobile ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH an...

Journal: :Telecommunication Systems 2011
Cheng-Chi Lee I-En Liao Min-Shiang Hwang

In this paper, a new Global System of Mobile Communications (GSM) authentication protocol is proposed to improve some drawbacks of the current GSM authentication protocol for roaming users including: (a) communication overhead between VLR; (b) huge bandwidth consumption between VLR and HLR; (c) storage space overhead in VLR; (d) overloaded in HLR with authentication of mobile stations; and (e) ...

Journal: :CoRR 2012
Noureddine Chikouche Cherif Foudil Mohamed Benmohammed

Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, ...). Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید