The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, it has been shown that heterogeneous wireless sensor networks (HWSN) outperform homogeneous WSN. However, security is still the critical issue. In this paper, we study the impact of node capture attack on three key management schemes designed for heterogeneous wireless sensor networks (HWSN): asymmetric pre-distribution key management (AP scheme), HERO and TLA schemes. We formalize this...
This paper proposes an efficient architecture to produce a hierarchical access control scheme for the multicast application environment. The architecture divides the group members into several subgroups with different access rights. In order to enhance the efficiency, the theory of Weil pairing is introduced to present a three party key agreement protocol. The advantages of this scheme are : (1) easy...
Formally evaluating the strengths of a given cryptosystem will ensure that no flaws have crept into the application. During our investigation, we adopted Armknecht and Krause's approach to model the E0 encryption function, which does not depend on memory bits and will hold for every clock tick. We devised a polynomial of degree four consisting of 20 variables, 16 considered unknown and four known...
Mobile ad hoc network (MANET) consists of a set of wireless devices such as PDAs and notebooks. In MANET there is no centralized administration as well as base station, so the network topology changes frequently. Group communication in MANET is becoming more important day by day because of increasing popularity of MANET as well as constructing subgroups to support ldquomany-to-manyrdquo communication...
A powerpoint presentation is given. The paper discusses the experimental evaluation of the performance costs of different IKEv2 authentication methods. Internet key exchange version 2 protocol negotiates security associations for IPsec, authenticates the peer, supports the extensible authentication protocol methods and a candidate technology in future AAA frameworks which is a major issue in next...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.