[go: up one dir, main page]

Chu et al., 2015 - Google Patents

Authentication protocol design and low-cost key encryption function implementation for wireless sensor networks

Chu et al., 2015

Document ID
8522525587891030748
Author
Chu S
Huang Y
Lin W
Publication year
Publication venue
IEEE Systems Journal

External Links

Snippet

Wireless sensor networks (WSNs) have been widely used, most notably in real-time traffic monitoring and military sensing and tracking. However, WSN applications could suffer from threats and endanger the applications if the suitable security issues are not taken into …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Similar Documents

Publication Publication Date Title
Masud et al. A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care
Luo et al. SLAP: Succinct and lightweight authentication protocol for low-cost RFID system
Masud et al. 3P-SAKE: privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks
Roy et al. PLAKE: PUF-based secure lightweight authentication and key exchange protocol for IoT
Kifouche et al. Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications
Tanveer et al. ARAP-SG: Anonymous and reliable authentication protocol for smart grids
Saleem et al. Security analysis on “A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems”
Mansoor et al. Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices
Gao et al. Mobile network security and privacy in WSN
Karakaya et al. A survey on post‐quantum based approaches for edge computing security
Mousavi et al. Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems)
Kumar et al. A review and analysis of secure and lightweight ECC‐based RFID authentication protocol for Internet of Vehicles
Kumar et al. UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks
Nyangaresi et al. Anonymous authentication scheme based on physically unclonable function and biometrics for smart cities
Chu et al. Authentication protocol design and low-cost key encryption function implementation for wireless sensor networks
Chakraborty et al. Lightweight micro-architecture for IoT & FPGA security
Jebrane et al. ILAPU-Q: an improved lightweight authentication protocol for IoT based on U-Quark hash function
Nikitha et al. Hybrid cryptographic algorithm to secure internet of things
Saran et al. An improvised algorithm for a dynamic key generation model
Qi et al. A security transmission and early warning mechanism for intelligent sensing information in internet of things
Elganzoury et al. A new secure one-time password algorithm for mobile applications
El Makhtoum et al. Secure and lightweight authentication protocol for smart metering system
Nandu et al. An enhanced authentication mechanism to secure re-programming in WSN
Chiadighikaobi et al. Dmuas-iot: a decentralised multi-factor user authentication scheme for iot systems
Radhi et al. Secure and fast remote application–based authentication dragonfly using an led algorithm in smart buildings