نتایج جستجو برای: desynchronization attack

تعداد نتایج: 82948  

2011
Kuo-Hui Yeh Nai-Wei Lo Yingjiu Li Yung-Chun Chen Tzong-Chen Wu

In order to protect privacy of RFID tag against malicious tag tracing activities, most RFID authentication protocols support forward/backward security properties by updating the same secret values held at both tag end and database end asynchronously during each authentication session. However, in real network environments an adversary may easily interrupt or interfere transmission of necessary ...

Journal: :Journal of Sensors 2022

Machine-to-machine communication allows smart devices like sensors, actuators, networks, gateways, and other controllers to communicate with one another. The industrial Internet of things (IIoT) has become a vital component. Many are connected perform task automatically in machine-to-machine communication, but they not properly secured, allowing an adversary compromise them against variety atta...

2015
Carolina B Tabernig Lucía C Carrere Camila A Lopez Carlos Ballario

Brain Computer Interfaces (BCI) can be used for therapeutic purposes to improve voluntary motor control that has been affected post stroke. For this purpose, desynchronization of sensorimotor rhythms of the electroencephalographic signal (EEG) can be used. But it is necessary to study what happens in the affected motor cortex of this people. In this article, we analyse EEG recordings of hemiple...

2009
Eliyah Kilada

This paper thoroughly investigates the advantages and disadvantages of desynchronization. It also describes practical considerations that should be taken into account during the process of desynchronization of any ordinary clocked system. MiniMIPS is being desynchronized as a case study. The handshake protocol used in desynchronization, namely, Bundled4-Cycle-Late-Data protocol, is also introdu...

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Somitra Kumar Sanadhya Majid Naderi

EPC class 1 Generation 2(or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol known to be insecure. To improve the security of this standard, several protocols have been proposed compliant to this standard. In this paper we analyze the improved Yeh et al. ’s protocol by Yoon which is conforming to EPC-C1 G2 standard and is one ...

Journal: :Computer Networks 2021

In the field of side-channel analysis, profiled attacks are one most powerful types attacks. Nevertheless, major issues with in sensitivity to noise and high-dimensional nature signals used for training, generating a less efficient classifier conduct attack phase. Consequently, evaluating security cryptographic implementation hardware devices like IoT becomes more complex as analysis evaluation...

Journal: :CoRR 2017
Supasate Choochaisri Kittipat Apicharttrisorn Chalermek Intanagonwiwat

Desynchronization is one of the primitive services for complex networks because it arranges nodes to take turns accessing a shared resource. TDMA is a practical application of desynchronization because it allows node to share a common medium. In this paper, we propose a novel desynchronization algorithm using artificial force field called Multi-hop Desynchronization With an ARtificial Force fie...

Journal: :CoRR 2016
Huan Gao Yongqiang Wang

By spreading phases on the unit circle, desynchronization algorithm is a powerful tool to achieve round-robin scheduling, which is crucial in applications as diverse as media access control of communication networks, realization of analogto-digital converters, and scheduling of traffic flows in intersections. Driven by the increased application of pulse-coupled oscillators in achieving synchron...

2013
Andrew Nadeau Gaurav Sharma

Desynchronization vulnerabilities have limited audio watermarking’s success in applications such as digital rights management (DRM). Our work extends (blind-detection) spread spectrum (SS) watermarking to withstand time scale desynchronization (insertion/deletions) by applying dynamic programming (DP). Detection uses short SS watermark blocks with a novel O(N logN) correlation algorithm that pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید