The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Jamming emits white Gaussian noise that causes interference to both the legitimate receiver and eavesdropper. It has been an effective method for improving physical-layer security in wireless communication. In this paper, cautious jamming strategy based on optimal jammer selection method is proposed. More specifically, by using perfect channel state information, cautious jamming strategy selects an...
In order to meet the need of source authentication in a wireless sensor network composed of IRIS nodes, this paper presents the implementation and performance analysis of the elliptic curve digital signature algorithm (ECDSA) on IRIS nodes. We choose 7 kinds of optimization algorithms for ECDSA to test and compare their performance further. By turning these optimizations on or off, we compare their...
To meet the need of key agreement and pairwise-key creation between sensors in wireless sensor network composed of IRIS nodes, this paper presents the implementation of ECDH (elliptic curve Diffie-Hellman) key agreement scheme on IRIS nodes. We choose 6 kinds of optimization algorithms for ECDH to test and compare these optimization algorithms. By turning these optimization techniques on or off, we...
Traditional cryptography based authenticated Diffie-Hellman key exchange protocols expose the problems of efficiency and privacy since signature-then-encryption is heavy to wireless communication special for flexible dynamic deployment, i.e., wireless mesh networks, wireless sensor networks, mobile ad hoc networks, etc., in computational cost and communicational overhead and traditional digital signature...
The covert channel analysis has been the focus of high-level secure operating system research. Firstly, the concept and analysis methods of covert channel are described. Secondly, combined with the classic non-interference model of information flow, concept of a trusted pipeline has been applied to eliminate storage covert channel. Finally, a storage covert channel of object existence is analyzed,...
The Brushless Doubly-Fed Machine (BDFM), which removes the brush and slip ring, improves security and reliability. The BDFM is proposed to have a bright prospect as an AC drive system or variable-speed constant-frequency power generation system. Vector control is widely studied in the BDFM, but the information of rotor speed and position must be obtained. This paper presents speed sensorless vector...
In this paper, we build a secure and energy-efficient tree-structure route for the large-sized wireless sensor networks with only a resource-constrained sink node. Our proposed routing scheme has salient features: light overhead, quick formation, and immediate effectiveness. By constructing a neighbor table that contains the related key and energy information, the security and energy-efficiency of...
With the requirements of mobility, flexibility, and rapid response, public safety Mesh networks are widely used for emergency services to improve the efficiency of public safety communication to prevent or respond to incidents that harm or endanger persons or property. This special field communication brings new security challenges. In this paper, we propose a key agreement scheme with voting receiver...
In this paper, we propose a formal model of trust chain from the view of measurement structure and remote attestation. Trust chain is an important technology in Trusted Computing and has received considerable attention. However, related researches on trust chain have some deficiencies such as the coarse granularity, single measurement function and ignorance of influence from run-environment when report...
In this paper, we present an energy-efficient dynamic key management scheme in which new sensor nodes can join a sensor network securely and compromised nodes can be isolated from the network in time. Unlike in centralized and location-based key management schemes, our scheme doesn't depend on such infrastructure as base stations and robots, thus it possesses a high level of flexibility. By using...
Building trust has been recognized as a new security approach for wireless distributed networks. In the paper, we try to provide a completely new view by building trust territory in ad hoc networks. The concept of trust territory is addressed and the approach to build trust territory is also discussed. A trust territory contains all nodes trusted by the node. It is considered secure to communicate...
An UHF Radio Frequency Identification (RFID) transponder, which can function according to either standard ISO 18000-6 B or security ISO 18000-6 B with Advanced Encryption Standard (AES), is presented in this paper. The UHF RFID transponder is composed of analog front-end (AFE) and digital signal processing unit. A novel demodulator in AFE is presented in this paper. Silicon area occupied by the demodulator...
To deal with challenges and problems in trust measurement, we propose a dynamic behaviors measurement model based on Interactive Markov Chain (IMC). In this model, we use two different ways to obtain system runtime expectations of performance and functions. The one way is Temporal Probability of Executing Routes (TPER), which introduces the relationship between behavior sequences and time. The other...
Many password authentication schemes have been proposed for electronic commerce environment; however, none of them is secure enough. Hwang and Yeh proposed an improvement on the Peyravian-Zunic password authentication scheme including protected password transmission and password change. We demonstrate that the Hwang-Yeh scheme is also vulnerable to several kinds of attacks though the scheme has repaired...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.