The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
User authentication scheme for sensor networks is proposed. In proposed scheme, we employ polynomial share and the hash value with a secret key as the basic means of constructing node authentication procedure in order to avoids the need for public key cryptography and reduce shortage overhead. The proposed scheme not only can achieve authentication mutually between communication two parts and prevent...
With the advance of technology, Public key cryptography (PKC) will be used - sooner or later - in wireless and sensor applications not only to provide security services like authentication, integrity and non-repudiation on the data provided, but also to achieve a perfect connectivity and a perfect resilience in large-scale wireless and sensor networks. One of the weak points of PKC is its performance,...
Adopting a system-of-systems perspective, a wide area network comprised of ballistic missile defense satellites and terrestrial nodes can be viewed as a hybrid, large-scale, mobile wireless sensor network. Each node is a stand-alone system that consists of a suite of sensors, a transceiver, and a processor. Building on research in the areas of wireless sensor networks and mobile ad hoc networks, this...
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of the strict constraints in power, processing and storage, designing an efficient key establishment protocol is not a trivial task. Compare with traditional public key cryptography, symmetric key cryptographic with key predistribution...
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a trusted source. There are two ways to achieve authentication: public key based and symmetric key based. Although previous work has shown that public key authentication is feasible on sensor nodes if used sparingly, it is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.