The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Freshness is one of the most desired security properties of sensor network communication architecture. And sequence number is a common technique that is used as a freshness identifier to achieve freshness transmission. However, due to characteristics of wireless sensor network, such as resource-constrained and attack prone, it is vulnerable and energy-expensive to transmit sequence number directly...
Recent years have seen much growing attention on RFID security. However, little work has been performed to address the security issues in the context of supply chain management, which is exactly the major field for RFID applications. In this paper, we take first step toward security and privacy management in such system. We here introduce the formal concept of traceability networks, identify the unique...
Key management is an important cryptographic primitive upon which other security services are built. Most of the existent pairwise key management protocols consider homogenous ad hoc sensor networks. However, recent researches have demonstrated the limitation of this architecture in terms of performance and scalability. Therefore, this paper focuses on proposing a pairwise key management protocol...
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but its security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against...
In this paper, we propose an anonymous protocol to secure nodes which have important roles in the network. We focus in the clustering approach to secure the mobile ad hoc networks (MANETs). In each cluster, a confident node is selected to ensure the certification authority (CA) roles; however, the cluster security depends in the security of the CA node. Therefore, we present an anonymous dynamic demilitarized...
Resource-constraint nature of wireless sensor network (WSN) makes the security issue certainly a big challenge. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper we present a secured key management protocol (SecCOSEN) adopted on COSEN, a chain oriented sensor network, which is used for periodic data collection. SecCOSEN uses partial key pre-distribution...
Hierarchy-based wireless sensor networks (WSNs) achieve excellent performance with reserving energy consumption and decreasing system delay. However, distinguished hierarchy-based research such as LEACH (low-energy adaptive clustering hierarchy) does not consider a security issue for ensuring the protection of the network. Due to the peculiar character of LEACH such as round base operation and header...
Kerberos is a widely used computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. This paper presents an approach that involves a new authentication protocol that combines delaying the decryption with timed authentication by using passwords and session keys for authentication purposes, and frequent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.