Chu et al., 2015 - Google Patents
Authentication protocol design and low-cost key encryption function implementation for wireless sensor networksChu et al., 2015
- Document ID
- 8522525587891030748
- Author
- Chu S
- Huang Y
- Lin W
- Publication year
- Publication venue
- IEEE Systems Journal
External Links
Snippet
Wireless sensor networks (WSNs) have been widely used, most notably in real-time traffic monitoring and military sensing and tracking. However, WSN applications could suffer from threats and endanger the applications if the suitable security issues are not taken into …
- 230000000875 corresponding 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Masud et al. | A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care | |
Luo et al. | SLAP: Succinct and lightweight authentication protocol for low-cost RFID system | |
Masud et al. | 3P-SAKE: privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks | |
Roy et al. | PLAKE: PUF-based secure lightweight authentication and key exchange protocol for IoT | |
Kifouche et al. | Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications | |
Tanveer et al. | ARAP-SG: Anonymous and reliable authentication protocol for smart grids | |
Saleem et al. | Security analysis on “A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems” | |
Mansoor et al. | Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices | |
Gao et al. | Mobile network security and privacy in WSN | |
Karakaya et al. | A survey on post‐quantum based approaches for edge computing security | |
Mousavi et al. | Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems) | |
Kumar et al. | A review and analysis of secure and lightweight ECC‐based RFID authentication protocol for Internet of Vehicles | |
Kumar et al. | UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks | |
Nyangaresi et al. | Anonymous authentication scheme based on physically unclonable function and biometrics for smart cities | |
Chu et al. | Authentication protocol design and low-cost key encryption function implementation for wireless sensor networks | |
Chakraborty et al. | Lightweight micro-architecture for IoT & FPGA security | |
Jebrane et al. | ILAPU-Q: an improved lightweight authentication protocol for IoT based on U-Quark hash function | |
Nikitha et al. | Hybrid cryptographic algorithm to secure internet of things | |
Saran et al. | An improvised algorithm for a dynamic key generation model | |
Qi et al. | A security transmission and early warning mechanism for intelligent sensing information in internet of things | |
Elganzoury et al. | A new secure one-time password algorithm for mobile applications | |
El Makhtoum et al. | Secure and lightweight authentication protocol for smart metering system | |
Nandu et al. | An enhanced authentication mechanism to secure re-programming in WSN | |
Chiadighikaobi et al. | Dmuas-iot: a decentralised multi-factor user authentication scheme for iot systems | |
Radhi et al. | Secure and fast remote application–based authentication dragonfly using an led algorithm in smart buildings |