期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于IPoE的双栈网络无感知认证技术研究与实验仿真 被引量:1
1
作者 彭治湘 《现代计算机》 2021年第1期93-97,共5页
全国推进IPv6部署工作已经初见成效,但是IPv4和IPv6网络仍将在很长一段时间内共存。在双栈网络环境下,展开IPoE无感知认证技术研究,融合网络行为管理系统,提出基于IPoE的双栈网络无感知认证技术架构并进行实验仿真,结果表明该技术可以... 全国推进IPv6部署工作已经初见成效,但是IPv4和IPv6网络仍将在很长一段时间内共存。在双栈网络环境下,展开IPoE无感知认证技术研究,融合网络行为管理系统,提出基于IPoE的双栈网络无感知认证技术架构并进行实验仿真,结果表明该技术可以安全快速地实现双栈网络用户接入。 展开更多
关键词 双栈网络 IPOE 无感认证 仿真实验
下载PDF
Authentication masking code against DoS of T-MAC protocol 被引量:2
2
作者 SON Young-ho HONG Jin-keun BAE Keun-sung 《Journal of Central South University》 SCIE EI CAS 2013年第7期1889-1895,共7页
Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient... Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7. 展开更多
关键词 time out-medium access control (T-MAC) security vulnerability AUTHENTICATION SYNCHRONIZATION authenticationmasking code
下载PDF
OvBNN authentication based on cooperative signature for wireless sensor networks 被引量:1
3
作者 秦丹阳 Zhang Yan +1 位作者 Ma Jingya Ji Ping 《High Technology Letters》 EI CAS 2018年第3期287-295,共9页
The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key man... The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key management and secure routing protocol. Although the signature mechanism based on symmetric encryption is high in energy efficiency,it is vulnerable to be attacked and there is a time delay during authentication. Traditional public key encryption mechanism with improvement in security brings in complex algorithm and costs much time,which is not suitable for WSN. In this paper,a signature authentication mechanism,an optimized variant Bellare Namprempre Neven( OvBNN) is presented to quickly complete the authentication by mutual cooperation between nodes so as to make the nodes use the intermediate calculation results of their neighbor nodes directly.Simulation results show that the proposed mechanism is superior to traditional authentication mechanisms both in energy consumption and authentication time. 展开更多
关键词 optimized variant Bellare Namprempre Neven (OvBNN) digital signature authentication speed energy consumption wireless sensor networks (WSN)
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部