The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, Wireless Sensor Network (WSN) is becoming a hot topic after the "Sensor China" concept proposed in 2009. Sensor nodes are deployed in a hostile or unattended environment to collect the data information. Therefore, network security has become a big problem. A new key management scheme of security network architecture for wireless sensor network is presented in this paper. The proposed...
In this paper we propose a four-stage design approach towards securing a VANET architecture with an improved PKI structure. The new PKI structure helps in keeping the users autonomous, whilst achieving the security alongside. Communication between the central certificate authority is minimized by employing self authorization by the users. This is attained by self generation of pseudonyms. This scheme...
The combination of the wireless sensor network (WSN) and grid computing in wireless sensor grid (WSG) architecture enables the strengths and characteristics of wireless sensor network and grid computing to be realized on a single integrated platform. This paper analyzes the necessity and key problems of combining the WSN and grid computing and shows a sensor grid architecture which is based on an...
Key management is an important cryptographic primitive upon which other security services are built. Most of the existent pairwise key management protocols consider homogenous ad hoc sensor networks. However, recent researches have demonstrated the limitation of this architecture in terms of performance and scalability. Therefore, this paper focuses on proposing a pairwise key management protocol...
The paper introduces the structure of the EPC network, analyzes the potential security problems of the EPC network information service (EPCIS). Expatiates the light PKI EPCIS trust model based on PKI, the proposed light PKI trust architecture is much simpler and efficient. Put forward a based on the enterprise trust and collaboration model (ETCM) and the search algorithm of the trust corporate relations...
In this paper, we suggest a peer authentication method that authorizes the peer which requests the other peer to use a service of it on super peer based peer-to-peer (P2P) network architecture. The proposed peer authentication method, at which one-time session-keys, public key certificate (PKC) and ticket authentication mechanism are applied, enables each peer to perform strong mutual authentication...
RFID (radio frequency identification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authentication and protection against tracking of RFID tags without loosing the system scalability, a public-key based approach is inevitable, which is shown by M. Burmester et al. In this paper, we present an architecture of a state-of-the-art...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.