期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks 被引量:1
1
作者 Thiruppathy Kesavan.V Radhakrishnan.S 《China Communications》 SCIE CSCD 2016年第6期178-194,共17页
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or... In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. 展开更多
关键词 CLUSTER dynamic key HETEROGENEOUS MOBILITY wireless sensor network WEIGHT
下载PDF
F-structure model of overlying strata for dynamic disaster prevention in coal mine 被引量:8
2
作者 Mu Zonglong Dou Linming +1 位作者 He Hu Fan Jun 《International Journal of Mining Science and Technology》 SCIE EI 2013年第4期508-514,共7页
The rupture and movement scope of overlying strata upon the longwall mining face increased sharply as the exploitation scale and degree growing recently,and the spatial structure formed by fractured strata became much... The rupture and movement scope of overlying strata upon the longwall mining face increased sharply as the exploitation scale and degree growing recently,and the spatial structure formed by fractured strata became much more complex.The overlying strata above the working face and adjacent gobs would affect each other and move cooperatively because small pillar can hardly separate the connection of overlying strata between two workfaces,which leads to mining seismicity in the gob and induces rockburst disaster that named spatial structure instability rockburst in this paper.Based on the key stratum theory,the F-structure model was established to describe the overlying strata characteristic and rockburst mechanism of workface with one side of gob and the other side un-mined solid coal seam.The results show that F-structure in the gob will re-active and loss stability under the influence of neighboring mining,and fracture and shear slipping in the process of instability is the mechanism of the seismicity in the gob.The F-structure was divided into two categories that short-arm F and long-arm F structure based on the state of strata above the gob.We studied the underground pressure rules of different F-structure and instability mechanism,thus provide the guide for prevention and control of the F-structure spatial instability rockburst.The micro-seismic system is used for on-site monitoring and researching the distribution rules of seismic events,the results confrmed the existence and correct of F-spatial structure.At last specialized methods for prevention seismicity and rockburst induced by F-structure instability are proposed and applied in Huating Coal Mine. 展开更多
关键词 Overlying strata Spatial structure dynamic disaster key strata Seismicity
下载PDF
Dynamic Encryption and Secure Transmission of Terminal Data Files 被引量:1
3
作者 Ruchun Jia Yang Xin +1 位作者 Bo Liu Qin Qin 《Computers, Materials & Continua》 SCIE EI 2022年第4期1221-1232,共12页
Data is the last defense line of security,in order to prevent data loss,no matter where the data is stored,copied or transmitted,it is necessary to accurately detect the data type,and further clarify the form and encr... Data is the last defense line of security,in order to prevent data loss,no matter where the data is stored,copied or transmitted,it is necessary to accurately detect the data type,and further clarify the form and encryption structure of the data transmission process to ensure the accuracy of the data,so as to prevent data leakage,take the data characteristics as the core,use transparent encryption and decryption technology as the leading,and According to the data element characteristics such as identity authentication,authority management,outgoing management,file audit and external device management,the terminal data is marked with attributes to form a data leakage prevention module with data function,so as to control the data in the whole life cycle from creation,storage,transmission,use to destruction,no matter whether the data is stored in the server,PC or mobile device,provide unified policy management,form ecological data chain with vital characteristics,and provide comprehensive protection system for file dynamic encryption transmission,such as prevention in advance,control in the event,and audit after the event,so as to ensure the security of dynamic encryption in the process of file transmission,ensure the core data of the file,and help the enterprise keep away from the risk of data leakage. 展开更多
关键词 Terminal data data anti disclosure dynamic symmetric key dncryption algorithm secure transmission
下载PDF
Fast and Efficient Security Scheme for Blockchain-Based IoT Networks
4
作者 K.A.Fasila Sheena Mathew 《Computers, Materials & Continua》 SCIE EI 2022年第10期2097-2114,共18页
Internet of Things(IoT)has become widely used nowadays and tremendous increase in the number of users raises its security requirements as well.The constraints on resources such as low computational capabilities and po... Internet of Things(IoT)has become widely used nowadays and tremendous increase in the number of users raises its security requirements as well.The constraints on resources such as low computational capabilities and power requirements demand lightweight cryptosystems.Conventional algorithms are not applicable in IoT network communications because of the constraints mentioned above.In this work,a novel and efficient scheme for providing security in IoT applications is introduced.The scheme proposes how security can be enhanced in a distributed IoT application by providing multilevel protection and dynamic key generation in the data uploading and transfer phases.Existing works rely on a single key for communication between sensing device and the attached gateway node.In proposed scheme,this session key is updated after each session and this is done by applying principles of cellular automata.The proposed system provides multilevel security by using incomparable benefits of blockchain,dynamic key and random number generation based on cellular automata.The same was implemented and tested with the widely known security protocol verification tool called Automated Validation of Internet Security Protocols and Applications(AVISPA).Results show that the scheme is secure against various attacks.The proposed scheme has been compared with related schemes and the result analysis shows that the new scheme is fast and efficient also. 展开更多
关键词 Cellular automata based key generation dynamic key generation IoT security No-share key Exchange blockchain for IoT mutual authentication
下载PDF
Effective Identity Authentication Based on Multiattribute Centers for Secure Government Data Sharing
5
作者 Meiquan Wang Junhua Wu +2 位作者 Tongdui Zhang Junhao Wu Guangshun Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第3期736-752,共17页
As one of the essential steps to secure government data sharing,Identity Authentication(IA)plays a vital role in the processing of large data.However,the centralized IA scheme based on a trusted third party presents p... As one of the essential steps to secure government data sharing,Identity Authentication(IA)plays a vital role in the processing of large data.However,the centralized IA scheme based on a trusted third party presents problems of information leakage and single point of failure,and those related to key escrow.Therefore,herein,an effective IA model based on multiattribute centers is designed.First,a private key of each attribute of a data requester is generated by the attribute authorization center.After obtaining the private key of attribute,the data requester generates a personal private key.Second,a dynamic key generation algorithm is proposed,which combines blockchain and smart contracts to periodically update the key of a data requester to prevent theft by external attackers,ensure the traceability of IA,and reduce the risk of privacy leakage.Third,the combination of blockchain and interplanetary file systems is used to store attribute field information of the data requester to further reduce the cost of blockchain information storage and improve the effectiveness of information storage.Experimental results show that the proposed model ensures the privacy and security of identity information and outperforms similar authentication models in terms of computational and communication costs. 展开更多
关键词 blockchain identity authentication DISTRIBUTION dynamic key generation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部