Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
To provide secure data transmission in Cluster Wireless Sensor Networks (CWSNs), the challenging task is to provide an efficient key management technique. To enhance the performance of sensor networks, clustering approach is used. Wireless Sensor Network (WSN) comprises of large collection of sensors having different hardware configurations and functionalities. Due to limited storage space and battery...
In this paper, we define the RC4 state and introduce its forward and backward property. Based on the RC4 state and its forward and backward property, a simple, lightweight, but robust security protocol which achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operations is presented. Furthermore, an RC4 state based hash function for the...
Digital Image Encryption is the image processing in the field of a new branch. This paper discusses the modern cryptography, and RSA algorithms. Root According to the data features of digital image itself, designed and implemented digital image based on RSA encryption algorithm, and made further studies of the head. The wireless sensor networks, which self-organized, are data-centered. The current...
Secure data transmission and data routing are critical in designing cluster based sensor network. This paper presents a secure energy efficient dynamic routing scheme (SEEDR) for wireless sensor networks. SEEDR uses a symmetric cryptography algorithm to support security. The dynamic key exchange protocol based on DH (Diffie-Hellman) algorithm is proposed, with non blocking OVSF codes. Our analytical...
In this paper, we present a simple, lightweight, but robust security protocol for resource-constrained communications. This protocol is based on the backward property of RC4 stream cipher and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operations. Furthermore, an RC4-based hash function for the generation of message authentication...
Sensor networks are expected to be used at anywhere in the near future and recently their security problems have been rising. Due to the limited computing power of senor nodes, it is impossible to use asymmetric cryptography approaches for the session key establishment or to apply advanced encryption method such as AES and DES for the data encryption. In this paper, therefore, we propose a key establishment...
Secure data transmission and data aggregation are critical in designing wireless sensor networks. This paper presents a hash based secure aggregation protocol for sensor network. It uses one way hash function to generate pattern code for the real sensor readings which help aggregator eliminate redundant message without known any raw plaintext data. The scheme also requires aggregator provide commitment...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.