The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Authentication and key distribution (AKD) protocols become more and more important in the design of wireless networks. The design criteria of the AKD protocols include the scalability, the communication efficiency, the computational efficiency and the robustness of security. In this paper, we first analyze the vulnerabilities of an AKD protocol for wireless networks under three types of attacks. Then,...
Fast re-authentication schemes for mobile stations are essential during handover between access points in wireless local area networks. Although lots of research resources have been put into the reduction of re-authentication latency, these schemes developed so far seem to either suffer from heavy overhead or have weak security. This paper proposes a novel ticket-based approach to deal with the problem...
Three-party authenticated key exchange protocol (3PAKE) is an important cryptographic technique for secure communication which allows two parties to agree a new secure session key with the help of a trusted server. In this paper, we proposed a new three-party authenticated key exchange protocol which aims to achieve more efficiency with the same security level of other existing 3PAKE protocols. Security...
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys are required to be established between them. Considering the strict resource constraints of sensors, key infection has been proposed by Anderson, Chan, and Perrig. However, because the communication keys are broadcasted in plaintext in key infection, some of them may be eavesdropped...
Based on the simulation paradigm, Acs et al proposed a formal model tailored to the security analysis of on-demand source routing protocols in MANET, and a new routing protocol, called endairA, was proven secure in the model. We indicate the improper manipulations such as mergence of the adjacent adversarial nodes, the improper definition of secure route in the model, and the flaw in the proof for...
We consider the problem of group key agreement among n parties communicating over an insecure ad hoc network. Firstly, we analyze the state and the problem of existing group key management schemes, and then present a secure, efficient and contributory group key management scheme, which is based on elliptic curve cryptosystems (ECC). The security of our scheme relies on the hardness of elliptic curve...
Available WLAN Mesh network access protocols and trusted network connect protocols can not satisfy the performance and security requirements of WLAN Mesh networks in trusted environment. A provably secure trusted access protocol MN-TAP for the WLAN Mesh Networks is proposed. Such protocol will achieve authentication and key confirmation among the access requestor, policy enforcement point and policy...
Security and privacy of wireless sensor networks are key research issues recently. Most existing researches regarding wireless sensor network security consider homogenous sensor networks. To achieve better security and performance, we adopt a heterogeneous wireless sensor network (HWSN) model that consists of physically different types of sensor nodes. This paper presents a secure message distribution...
In order to speed up the propagating process, the worms need to scan many IP addresses to target vulnerable hosts. However, the distribution of IP addresses is highly nonuniform, which results in many scans wasted on invulnerable addresses. Inspired by the theory of good point set, this paper proposes a new scanning strategy, referred to as good point set scanning (GPSS), for worms. Experimental results...
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limited resources and security, no key distribution technique is ideal to all the scenarios where sensor networks are used. In this paper, we primarily focus on storage requirements of several...
With the rapid development of the WLAN, the 802.11s mesh network is emerging. However, the security in the 802.11s mesh network is not well defined or specified, and there is no standard method to authenticate a mesh point that is creating a mesh link. In this paper, a solution is proposed for the authentication of mesh points in the infrastructure model. In this proposal, the 802.1X/EAP and neighbor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.