نتایج جستجو برای: Random Key Distribution

تعداد نتایج: 1361267  

Journal: :journal of communication engineering 0
mohammad ehdaie parsa sharif research center nikolaos alexiou kth panos papadimitratos kth

sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

Mahmoud Ahmadian Mohammad Ehdaie, Mohammad Reza Aref Nikos Alexiou Panos Papadimitratos,

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

Journal: :International Journal on Smart Sensing and Intelligent Systems 2016

Journal: :IACR Cryptology ePrint Archive 2007
Marek Klonowski Miroslaw Kutylowski Michal Ren Katarzyna Rybarczyk

We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a system of dynamic pairwise keys based on design due to Ren, Tanmoy and Zhou. We design and analyze a variation of this scheme, in which capturing a node does not lead to security threats for the past communication. Instead...

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

Journal: :Quantum Information & Computation 2009
G. B. Xavier Thiago Ferreira da Silva G. Vilela de Faria Guilherme Penello Temporão Jean Pierre von der Weid

A simple protocol which takes advantage of the inherent random times of detections in single photon counting modules is presented for random active basis choices when using entanglement-based protocols for Quantum Key Distribution (QKD). It may also be applicable to the BB84 protocol in certain cases. The scheme presented uses the single photon detectors already present on a QKD setup, working ...

2008
Qin Li Dongyang Long Changji Wang

Two arbitrated quantum signature schemes, one with message recovery and the other with appendix, are proposed. The most significant property of the proposed schemes is that both the signatory and the receiver can share and use a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the shared key could be used o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید