The applications of wireless sensor network(WSN)exhibits a significant rise in recent days since it is enveloped with various advantageous benefits.In the medical field,the emergence of WSN has created marvelous chang...The applications of wireless sensor network(WSN)exhibits a significant rise in recent days since it is enveloped with various advantageous benefits.In the medical field,the emergence of WSN has created marvelous changes in monitoring the health conditions of the patients and so it is attracted by doctors and physicians.WSN assists in providing health care services without any delay and so it plays predominant role in saving the life of human.The data of different persons,time,places and networks have been linked with certain devices,which are collectively known as Internet of Things(IOT);it is regarded as the essential requirement of people in recent days.In the health care monitoring system,IOT plays a magnificent role,which has produced the real time monitoring of patient’s condition.However the medical data transmission is accomplished quickly with high security by the routing and key management.When the data from the digital record system(cloud)is accessed by the patients or doctors,the medical data is transferred quickly through WSN by performing routing.The Probabilistic Neural Network(PNN)is utilized,which authenticates the shortest path to reach the destination and its performance is identified by comparing it with the Dynamic Source Routing(DSR)protocol and Energy aware and Stable Routing(ESR)protocol.While performing routing,the secured transmission is achieved by key management,for which the Diffie Hellman key exchange is utilized,which performs encryption and decryption to secure the medical data.This enables the quick and secured transmission of data from source to destination with improved throughput and delivery ratio.展开更多
分析指出Liaw等人的远程用户认证方案(Mathematical and Computer Modelling,2006,No.1/2)容易受到重放攻击和中间人攻击,并且密码修改阶段和注册阶段存在安全漏洞,在此基础上提出一个基于D-H密钥交换协议的远程用户认证方案。理论分析...分析指出Liaw等人的远程用户认证方案(Mathematical and Computer Modelling,2006,No.1/2)容易受到重放攻击和中间人攻击,并且密码修改阶段和注册阶段存在安全漏洞,在此基础上提出一个基于D-H密钥交换协议的远程用户认证方案。理论分析结果表明,该方案可以抵抗假冒攻击、重放攻击、中间人攻击,安全地实现相互认证及会话密钥生成。展开更多
The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for ...The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for two party key agreement protocol, however most of the current secure protocols can not be prove to secure without Gap assumption. To avoid this phenomenon, by using twinning key technology we propose a new two party key agreement protocol TUP which is obtained by modifying the UP protocol, then in conjunction with the trapdoor test, we prove strictly that the new protocol is secure in eCK model. Compared with previous protocols, the security assumption of new proposal is more standard and weaker, and it also solves an open problem in ProvSec'09.展开更多
文摘The applications of wireless sensor network(WSN)exhibits a significant rise in recent days since it is enveloped with various advantageous benefits.In the medical field,the emergence of WSN has created marvelous changes in monitoring the health conditions of the patients and so it is attracted by doctors and physicians.WSN assists in providing health care services without any delay and so it plays predominant role in saving the life of human.The data of different persons,time,places and networks have been linked with certain devices,which are collectively known as Internet of Things(IOT);it is regarded as the essential requirement of people in recent days.In the health care monitoring system,IOT plays a magnificent role,which has produced the real time monitoring of patient’s condition.However the medical data transmission is accomplished quickly with high security by the routing and key management.When the data from the digital record system(cloud)is accessed by the patients or doctors,the medical data is transferred quickly through WSN by performing routing.The Probabilistic Neural Network(PNN)is utilized,which authenticates the shortest path to reach the destination and its performance is identified by comparing it with the Dynamic Source Routing(DSR)protocol and Energy aware and Stable Routing(ESR)protocol.While performing routing,the secured transmission is achieved by key management,for which the Diffie Hellman key exchange is utilized,which performs encryption and decryption to secure the medical data.This enables the quick and secured transmission of data from source to destination with improved throughput and delivery ratio.
文摘分析指出Liaw等人的远程用户认证方案(Mathematical and Computer Modelling,2006,No.1/2)容易受到重放攻击和中间人攻击,并且密码修改阶段和注册阶段存在安全漏洞,在此基础上提出一个基于D-H密钥交换协议的远程用户认证方案。理论分析结果表明,该方案可以抵抗假冒攻击、重放攻击、中间人攻击,安全地实现相互认证及会话密钥生成。
文摘The design and analysis of authenticated key exchange protocol is an important problem in information security area. At present, extended Canetti-Krawczyk (eCK) model provides the strongest definition of security for two party key agreement protocol, however most of the current secure protocols can not be prove to secure without Gap assumption. To avoid this phenomenon, by using twinning key technology we propose a new two party key agreement protocol TUP which is obtained by modifying the UP protocol, then in conjunction with the trapdoor test, we prove strictly that the new protocol is secure in eCK model. Compared with previous protocols, the security assumption of new proposal is more standard and weaker, and it also solves an open problem in ProvSec'09.