期刊文献+
共找到483篇文章
< 1 2 25 >
每页显示 20 50 100
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
1
作者 Yuling Chen Xiong Yang +2 位作者 Tao Li Yi Ren Yangyang Long 《Digital Communications and Networks》 SCIE CSCD 2024年第2期265-272,共8页
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For... Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network. 展开更多
关键词 wireless Sensor Network(WSN) Node authentication Blockchain TANGLE Worm detection
下载PDF
OvBNN authentication based on cooperative signature for wireless sensor networks 被引量:1
2
作者 秦丹阳 Zhang Yan +1 位作者 Ma Jingya Ji Ping 《High Technology Letters》 EI CAS 2018年第3期287-295,共9页
The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key man... The universality of the application of wireless sensor networks( WSN) makes more attention be paid on the security problem. Node authentication is not only the basis of network security,but also the premise of key management and secure routing protocol. Although the signature mechanism based on symmetric encryption is high in energy efficiency,it is vulnerable to be attacked and there is a time delay during authentication. Traditional public key encryption mechanism with improvement in security brings in complex algorithm and costs much time,which is not suitable for WSN. In this paper,a signature authentication mechanism,an optimized variant Bellare Namprempre Neven( OvBNN) is presented to quickly complete the authentication by mutual cooperation between nodes so as to make the nodes use the intermediate calculation results of their neighbor nodes directly.Simulation results show that the proposed mechanism is superior to traditional authentication mechanisms both in energy consumption and authentication time. 展开更多
关键词 optimized variant Bellare Namprempre Neven (OvBNN) digital signature authentication speed energy consumption wireless sensor networks (WSN)
下载PDF
PSAP-WSN:A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks
3
作者 Xuanang Li Shuangshuang Liu +1 位作者 Saru Kumari Chien-Ming Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期711-732,共22页
Nowadays,the widespread application of 5G has promoted rapid development in different areas,particularly in the Internet of Things(IoT),where 5G provides the advantages of higher data transfer rate,lower latency,and w... Nowadays,the widespread application of 5G has promoted rapid development in different areas,particularly in the Internet of Things(IoT),where 5G provides the advantages of higher data transfer rate,lower latency,and widespread connections.Wireless sensor networks(WSNs),which comprise various sensors,are crucial components of IoT.The main functions of WSN include providing users with real-time monitoring information,deploying regional information collection,and synchronizing with the Internet.Security in WSNs is becoming increasingly essential because of the across-the-board nature of wireless technology in many fields.Recently,Yu et al.proposed a user authentication protocol forWSN.However,their design is vulnerable to sensor capture and temporary information disclosure attacks.Thus,in this study,an improved protocol called PSAP-WSNis proposed.The security of PSAP-WSN is demonstrated by employing the ROR model,BAN logic,and ProVerif tool for the analysis.The experimental evaluation shows that our design is more efficient and suitable forWSN environments. 展开更多
关键词 5G wireless sensor networks IOT authentication protocol
下载PDF
Cogent and Energy Efficient Authentication Protocol for WSN in IoT 被引量:2
4
作者 Tariq Mahmood Butt Rabia Riaz +2 位作者 Chinmay Chakraborty Sanam Shahla Rizvi Anand Paul 《Computers, Materials & Continua》 SCIE EI 2021年第8期1877-1898,共22页
Given the accelerating development of Internet of things(IoT),a secure and robust authentication mechanism is urgently required as a critical architectural component.The IoT has improved the quality of everyday life f... Given the accelerating development of Internet of things(IoT),a secure and robust authentication mechanism is urgently required as a critical architectural component.The IoT has improved the quality of everyday life for numerous people in many ways.Owing to the predominantly wireless nature of the IoT,connected devices are more vulnerable to security threats compared to wired networks.User authentication is thus of utmost importance in terms of security on the IoT.Several authentication protocols have been proposed in recent years,but most prior schemes do not provide sufficient security for these wireless networks.To overcome the limitations of previous schemes,we propose an efficient and lightweight authentication scheme called the Cogent Biometric-Based Authentication Scheme(COBBAS).The proposed scheme is based on biometric data,and uses lightweight operations to enhance the efficiency of the network in terms of time,storage,and battery consumption.A formal security analysis of COBBAS using Burrows–Abadi–Needham logic proves that the proposed protocol provides secure mutual authentication.Formal security verification using the Automated Validation of Internet Security Protocols and Applications tool shows that the proposed protocol is safe against man-in-the-middle and replay attacks.Informal security analysis further shows that COBBAS protects wireless sensor networks against several security attacks such as password guessing,impersonation,stolen verifier attacks,denial-of-service attacks,and errors in biometric recognition.This protocol also provides user anonymity,confidentiality,integrity,and biometric recovery in acceptable time with reasonable computational cost. 展开更多
关键词 Internet of things wireless sensor networks authentication Burrows-Abadi-Needham logic fuzzy extractor elliptic curve cryptography
下载PDF
Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS 被引量:1
5
作者 V.Manikandan M.Sivaram +2 位作者 Amin Salih Mohammed V.Porkodi K.Shankar 《Computers, Materials & Continua》 SCIE EI 2021年第6期4005-4018,共14页
Wireless Sensor Networks(WSN)has been extensively utilized as a communication model in Internet of Things(IoT).As well,to offer service,numerous IoT based applications need effective transmission over unstable locatio... Wireless Sensor Networks(WSN)has been extensively utilized as a communication model in Internet of Things(IoT).As well,to offer service,numerous IoT based applications need effective transmission over unstable locations.To ensure reliability,prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs.Moreover,these models are affected by crucial denial of service(DoS)attacks,where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs.Here,secure localization based authentication(SLA)is presented to fight against DoS attack,and to fulfil the need of reliability and authentication.By examining state information,SLA projects a trust model to enhance efficacy of data delivery.Indeed,of the prevailing opportunistic protocols,SLA guarantees data integrity by modelling a trust based authentication,providing protection against DoS attackers and diminishing computational costs.Specifically,this model acts as a verification strategy to accelerate?attackers and to handle isolation.This strategy helps SLA in eliminating duplicate transmission and by continuous verification that results from conventional opportunistic routing.Simulation is performed in a MATLAB environment that offers authentic and reliable delivery by consuming approximately 50%of the cost in contrast to other approaches.The anticipated model shows better trade off in comparison to the prevailing ones. 展开更多
关键词 wireless sensor networks opportunistic routing secure localization based authentication denial of service computational cost
下载PDF
Architectural Approaches to Network and Service Access Authentication
6
作者 Marcin Dabrowski Piotr Pacyna 《China Communications》 SCIE CSCD 2007年第3期4-16,共13页
Authentication is the first step,of central importance, for access control and for security protection in radio access networks.A general model for authentication was adopted from fixed networks and applied to the wir... Authentication is the first step,of central importance, for access control and for security protection in radio access networks.A general model for authentication was adopted from fixed networks and applied to the wireless world.However,the differences in the operational environment between the fixed and the wireless world,heterogeneity of the radio communications systems,new trends in service provisioning, emerging business models and performance requirements raise the need to revisit the original requirements for authentication systems and to come up with schemes that better suit current needs.In this review paper we discuss authentication in singlehop radio access networks by characterizing the current as well as the emerging authentication schemes. 展开更多
关键词 authentication access control wireless networks next-generation Internet
下载PDF
An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN
7
作者 Shadi Nashwan 《Computers, Materials & Continua》 SCIE EI 2021年第7期607-642,共36页
The healthcare internet of things(IoT)system has dramatically reshaped this important industry sector.This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable conne... The healthcare internet of things(IoT)system has dramatically reshaped this important industry sector.This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers.The goal is the remote monitoring of a patient’s physiological data by physicians.Moreover,this system can reduce the number and expenses of healthcare centers,make up for the shortage of healthcare centers in remote areas,enable consultation with expert physicians around the world,and increase the health awareness of communities.The major challenges that affect the rapid deployment and widespread acceptance of such a system are the weaknesses in the authentication process,which should maintain the privacy of patients,and the integrity of remote medical instructions.Current research results indicate the need of a flexible authentication scheme.This study proposes a scheme with enhanced security for healthcare IoT systems,called an end-to-end authentication scheme for healthcare IoT systems,that is,an E2EA.The proposed scheme supports security services such as a strong and flexible authentication process,simultaneous anonymity of the patient and physician,and perfect forward secrecy services.A security analysis based on formal and informal methods demonstrates that the proposed scheme can resist numerous security-related attacks.A comparison with related authentication schemes shows that the proposed scheme is efficient in terms of communication,computation,and storage,and therefore cannot only offer attractive security services but can reasonably be applied to healthcare IoT systems. 展开更多
关键词 Healthcare IoT systems wireless medical sensor networks mutual authentication service anonymity service perfect forward secrecy service COVID-19
下载PDF
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks 被引量:8
8
作者 Rong FAN ,Dao-jing HE ,Xue-zeng PAN,Ling-di PING (School of Computer Science and Technology,Zhejiang University,Hangzhou 310027,China) 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2011年第7期550-560,共11页
Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints.Considering that most large-scale WSNs follow a two-tiered architecture,we propose an efficient and d... Wireless sensor networks (WSNs) are vulnerable to security attacks due to their deployment and resource constraints.Considering that most large-scale WSNs follow a two-tiered architecture,we propose an efficient and denial-of-service (DoS)-resistant user authentication scheme for two-tiered WSNs.The proposed approach reduces the computational load,since it performs only simple operations,such as exclusive-OR and a one-way hash function.This feature is more suitable for the resource-limited sensor nodes and mobile devices.And it is unnecessary for master nodes to forward login request messages to the base station,or maintain a long user list.In addition,pseudonym identity is introduced to preserve user anonymity.Through clever design,our proposed scheme can prevent smart card breaches.Finally,security and performance analysis demonstrates the effectiveness and robustness of the proposed scheme. 展开更多
关键词 User authentication User anonymity Smart card Two-tiered wireless sensor network (WSN)
原文传递
A Biometric-Based User Authentication for Wireless Sensor Networks 被引量:4
9
作者 YUAN Jianjun JIANG Changjun JIANG Zuowen 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期272-276,共5页
This paper proposes a biometric-based user authentication protocol for wireless sensor networks (WSN) when a user wants to access data from sensor nodes, since WSN are often deployed in an unattended environment. Th... This paper proposes a biometric-based user authentication protocol for wireless sensor networks (WSN) when a user wants to access data from sensor nodes, since WSN are often deployed in an unattended environment. The protocol employs biometric keys and resists the threats of stolen verifier, of which many are logged-in users with the same login identity, guessing, replay, and impersonation. The protocol uses only Hash function and saves the computational cost, the communication cost, and the energy cost. In addition, the user's password can be changed freely using the proposed protocol. 展开更多
关键词 authentication BIOMETRICS SECURITY wireless sensor networks
原文传递
Analysis and Improvement on an Authentication Scheme for Wireless Sensor Networks in Internet of Things Environment
10
作者 LI Anqian KANG Baoyuan +3 位作者 ZUO Xinyu HUO Yuyan NIU Shufang SUN Zhu 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2023年第6期541-552,共12页
Nowadays, Internet of Everything has become a major trend, and Internet of Things(IoT) has emerged. Wireless sensor networks(WSNs) are core technologies for IoT to sense the real world. Due to the unattended and resou... Nowadays, Internet of Everything has become a major trend, and Internet of Things(IoT) has emerged. Wireless sensor networks(WSNs) are core technologies for IoT to sense the real world. Due to the unattended and resource-constrained characteristics of WSNs, it is a great challenge to design an efficient and secure authentication scheme for communication between users and sensor nodes in WSNs. Recently, Hu et al proposed an authentication scheme for WSNs in an IoT environment. They claimed that their scheme could maximize the balance between security and computational cost as well as efficiency, and be resistant to many known attacks. However, we find that the scheme is difficult to resist stolen smart card attack and denial-of-service attack. Moreover, during the login and key negotiation phase of the scheme, Gateway(GWN) is unable to extract key values for subsequent computation based on the messages sent by the sensor nodes, which in turn leads to the inability to achieve mutual authentication and key agreement. To overcome these shortcomings, we propose an improved scheme. The proposed scheme enables real-time data exchange and transmission as well as secure communication between users and sensor nodes. 展开更多
关键词 Internet of Things(IoT) wireless Sensor networks(WSNs) authentication elliptical curve cryptography(ECC)
原文传递
Novel Energy-Efficient Opportunistic Routing Protocol for Marine Wireless Sensor Networks Based on Compressed Sensing and Power Control
11
作者 XIAN Jiangfeng WU Huafeng +4 位作者 MEI Xiaojun ZHANG Yuanyuan CHEN Xinqiang ZHANG Qiannan LIANG Linian 《Journal of Ocean University of China》 SCIE CAS CSCD 2022年第6期1504-1516,共13页
In marine wireless sensor networks(MWSNs),an appropriate routing protocol is the key to the collaborative collection and efficient transmission of massive data.However,designing an appropriate routing protocol under t... In marine wireless sensor networks(MWSNs),an appropriate routing protocol is the key to the collaborative collection and efficient transmission of massive data.However,designing an appropriate routing protocol under the condition of sparse marine node deployment,highly dynamic network topology,and limited node energy is complicated.Moreover,the absence of continuous endto-end connection introduces further difficulties in the design of routing protocols.In this case,we present a novel energy-efficient opportunistic routing(Novel Energy-Efficient Opportunistic Routing,NEOR)protocol for MWSNs that is based on compressed sensing and power control.First,a lightweight time-series prediction method-weighted moving average method is proposed to predict the packet advancement value such that the number of location information that is exchanged among a node and its neighbor nodes can be minimized.Second,an adaptive power control mechanism is presented to determine the optimal transmitting power and candidate nodeset on the basis of node mobility,packet advancement,communication link quality,and remaining node energy.Subsequently,a timer-based scheduling algorithm is utilized to coordinate packet forwarding to avoid packet conflict.Furthermore,we introduce the compressed sensing theory to compress perceptual data at source nodes and reconstruct the original data at sink nodes.Therefore,energy consumption in the MWSNs is greatly reduced due to the decrease in the amount of data perception and transmission.Numerical simulation experiments are carried out in a wide range of marine scenarios to verify the superiority of our approach over selected benchmark algorithms. 展开更多
关键词 marine wireless sensor networks opportunistic routing weighted moving average adaptive power control compressed sensing
下载PDF
Hybrid Marine Predators Optimization and Improved Particle Swarm Optimization-Based Optimal Cluster Routing in Wireless Sensor Networks(WSNs)
12
作者 A.Balamurugan Sengathir Janakiraman +1 位作者 M.Deva Priya A.Christy Jeba Malar 《China Communications》 SCIE CSCD 2022年第6期219-247,共29页
Wireless Sensor Networks(WSNs)play an indispensable role in the lives of human beings in the fields of environment monitoring,manufacturing,education,agriculture etc.,However,the batteries in the sensor node under dep... Wireless Sensor Networks(WSNs)play an indispensable role in the lives of human beings in the fields of environment monitoring,manufacturing,education,agriculture etc.,However,the batteries in the sensor node under deployment in an unattended or remote area cannot be replaced because of their wireless existence.In this context,several researchers have contributed diversified number of cluster-based routing schemes that concentrate on the objective of extending node survival time.However,there still exists a room for improvement in Cluster Head(CH)selection based on the integration of critical parameters.The meta-heuristic methods that concentrate on guaranteeing both CH selection and data transmission for improving optimal network performance are predominant.In this paper,a hybrid Marine Predators Optimization and Improved Particle Swarm Optimizationbased Optimal Cluster Routing(MPO-IPSO-OCR)is proposed for ensuring both efficient CH selection and data transmission.The robust characteristic of MPOA is used in optimized CH selection,while improved PSO is used for determining the optimized route to ensure sink mobility.In specific,a strategy of position update is included in the improved PSO for enhancing the global searching efficiency of MPOA.The high-speed ratio,unit speed rate and low speed rate strategy inherited by MPOA facilitate better exploitation by preventing solution from being struck into local optimality point.The simulation investigation and statistical results confirm that the proposed MPOIPSO-OCR is capable of improving the energy stability by 21.28%,prolonging network lifetime by 18.62%and offering maximum throughput by 16.79%when compared to the benchmarked cluster-based routing schemes. 展开更多
关键词 marine Predators Optimization Algorithm(MPOA) Particle Swarm Optimization(PSO) Optimal Cluster-based Routing Cluster Head(CH)selection wireless Sensor networks(WSNs)
下载PDF
A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks:A Supervisory Approach to Pipelines 被引量:1
13
作者 Omid Mahdi Ebadati E. Farshad Eshghi Amin Zamani 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第1期323-349,共27页
Transmission pipelines are vulnerable to various accidents and acts of vandalism.Therefore,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network co... Transmission pipelines are vulnerable to various accidents and acts of vandalism.Therefore,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances,which monitors the physical and environmental conditions using sensors.Wireless sensor networks have many uses,including the built-in sensor on the outside of the pipeline or installed to support bridge structures,robotics,healthcare,environmental monitoring,etc.Wireless Sensor networks could be used to monitor the temperature,pressure,leak detection and sabotage of transmission lines.Wireless sensor networks are vulnerable to various attacks.Cryptographic algorithms have a good role in information security for wireless sensor networks.Now,various types of cryptographic algorithms provide security in networks,but there are still some problems.In this research,to improve the power of these algorithms,a new hybrid encryption algorithm for monitoring energy transmission lines and increasing the security of wireless sensor networks is proposed.The proposed hybrid encryption algorithm provides the security and timely transmission of data in wireless sensor networks to monitor the transmission pipelines.The proposed algorithm fulfills three principles of cryptography:integrity,confidentiality and authentication.The details of the algorithm and basic concepts are presented in such a way that the algorithm can be operational. 展开更多
关键词 wireless sensor networks PIPELINE CRYPTOGRAPHY cryptography algorithm hybrid cryptography CONFIDENTIALITY INTEGRATION authentication
下载PDF
A Secure and Efficient Handover Authentication and Key Management Protocol for 5G Networks 被引量:2
14
作者 Jiaqi Huang Yi Qian 《Journal of Communications and Information Networks》 CSCD 2020年第1期40-49,共10页
As a major component of thefifth-generation(5G)wireless networks,network densification greatly increases the network capacity by adding more cell sites into the network.However,the densified network increases the hand... As a major component of thefifth-generation(5G)wireless networks,network densification greatly increases the network capacity by adding more cell sites into the network.However,the densified network increases the handover frequency of fast-moving mobile users,like vehicles.Thus,seamless handover with security provision is highly desirable in 5G networks.The third generation partnership project(3GPP)has been working on standardization of the handover procedure in 5G networks to meet the stringent efficiency and security requirement.However,the existing handover authentication process in 5G networks has securityflaws,i.e.vulnerable to replay and de-synchronization attacks,and cannot provide perfect forward secrecy.In this paper,we propose a secure and efficient handover authentication and key management protocol utilizing the Chinese remainder theory.The proposed scheme preserves the majority part of the original 5G system architecture defined by 3GPP,thus can be easily implemented in practice.Formal security analysis based on BAN-logic shows that the proposed scheme achieves secure mutual authentication and can remedy some security flaws in original 5G handover process.Performance analysis shows that the proposed protocol has lower communication overhead and computation overhead compared with other handover authentication schemes. 展开更多
关键词 5G wireless network handover authentication key management SECURITY
原文传递
Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks 被引量:1
15
作者 Vivaksha Jariwala Vishal Singh +1 位作者 Prafulla Kumar Devesh C. Jinwala 《Journal of Information Security》 2014年第1期1-11,共11页
Wireless Sensor Networks (WSNs) typically use in-network processing to reduce the communication overhead. Due to the fusion of data items sourced at different nodes into a single one during in-network processing, the ... Wireless Sensor Networks (WSNs) typically use in-network processing to reduce the communication overhead. Due to the fusion of data items sourced at different nodes into a single one during in-network processing, the sanctity of the aggregated data needs to be ensured. Especially, the data integrity of the aggregated result is critical as any malicious update to it can jeopardize not one, but many sensor readings. In this paper, we analyse three different approaches to providing integrity support for SDA in WSNs. The first one is traditional MAC, in which each leaf node and intermediate node share a key with parent (symmetric key). The second is aggregate MAC (AMAC), in which a base station shares a unique key with all the other sensor nodes. The third is homomorphic MAC (Homo MAC) that is purely symmetric key-based approach. These approaches exhibit diverse trade-off in resource consumption and security assumptions. Adding together to that, we also propose a probabilistic and improved variant of homomorphic MAC that improves the security strength for secure data aggregation in WSNs. We carry out simulations in TinyOS environment to experimentally evaluate the impact of each of these on the resource consumption in WSNs. 展开更多
关键词 In-Network Processing INTEGRITY MESSAGE authentication Code SECURE Data AGGREGATION wireless Sensor networks
下载PDF
Anonymous authentication protocol for multi-services in wireless environments
16
作者 JIANG Nan WANG Jian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第4期69-74,共6页
To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this pro... To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved. 展开更多
关键词 authentication wireless networks trusted domain secret splitting hash chain
原文传递
Study on key management scheme for heterogeneous wireless sensor networks
17
作者 Qin Danyang Ma Jingya +3 位作者 Zhang Yan Yang Songxiang Ji Ping Feng Pan 《High Technology Letters》 EI CAS 2018年第4期343-350,共8页
Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it b... Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it becomes complex due to the mutual characteristics of sensor nodes in HWSN. In order to enhance the network security,an asymmetric key pre-distributed management scheme for HWSN is proposed combining with authentication process to further ensure the network security; meanwhile,an effective authentication method for newly added nodes is presented. Simulation result indicates that the proposed scheme can improve the network security while reducing the storage space requirement efficiently. 展开更多
关键词 HETEROGENEOUS wireless sensor network(HWSN) KEY management authentication NETWORK security STORAGE space
下载PDF
A Possible Development of Marine Internet: A Large Scale Cooperative Heterogeneous Wireless Network 被引量:3
18
作者 Shengming Jiang Huihui Chen 《通讯和计算机(中英文版)》 2015年第4期199-211,共13页
关键词 互联网接入 异构无线网络 海洋环境 合作 水下系统 成本效益 地面网络 网络服务
下载PDF
Wireless-LAN安全及认证方法的研究与分析 被引量:1
19
作者 杨新宇 阳玉俭 徐庆飞 《计算机应用研究》 CSCD 北大核心 2008年第10期2889-2892,2916,共5页
首先介绍了无线局域网面临的安全问题,并对无线局域网的安全要求进行了分析;介绍了国内外Wire-less-LAN安全认证机制的研究现状,在此基础上详细分析了基于EAP的无线网络安全认证方法;最后对几种主要的认证方法进行了分析比较。
关键词 无线局域网 安全机制 认证方法 可扩展认证协议
下载PDF
Wireless Network Security: The Mobile Agent Approach
20
作者 Olatunde Abiona Adeniran Oluwaranti +4 位作者 Ayodeji Oluwatope Surura Bello Clement Onime Mistura Sanni Lawrence Kehinde 《International Journal of Communications, Network and System Sciences》 2013年第10期443-450,共8页
The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access ... The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks. These characteristics make traditional cryptographic mechanism provide weak security for the wireless environment. We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our solution and propose a model for wireless network security. 展开更多
关键词 wireless Network SECURITY MOBILE AGENT authentication
下载PDF
上一页 1 2 25 下一页 到第
使用帮助 返回顶部