期刊文献+
共找到1,125篇文章
< 1 2 57 >
每页显示 20 50 100
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
1
作者 Saranya Vaithilingam Santhosh Aradhya Mohan Shankar 《International Journal of Intelligence Science》 2024年第2期49-57,共9页
The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potentia... The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication. 展开更多
关键词 Artificial Intelligence Cyber security QR codes Quishing AI Framework Machine Learning AI-Enhanced security
下载PDF
Artificial Noise Aided Polar Codes for Physical LayerSecurity 被引量:1
2
作者 Huiqing Bai Liang Jin Ming Yi 《China Communications》 SCIE CSCD 2017年第12期15-24,共10页
The secrecy rates of the existing practical secrecy coding methods are relative low to satisfy the security requirement of 5 G communications.We propose an artificial noise(AN) aided polar coding algorithm to improve ... The secrecy rates of the existing practical secrecy coding methods are relative low to satisfy the security requirement of 5 G communications.We propose an artificial noise(AN) aided polar coding algorithm to improve the secrecy rate.Firstly,a secrecy coding model based on AN is presented,where the confidential bits of last transmission code block are adopted as AN to inject into the current codeword.In this way,the AN can only be eliminated from the jammed codeword by the legitimate users.Since the AN is shorter than the codeword,we then develop a suboptimal jamming positions selecting algorithm with the goal of maximizing the bit error rate of the eavesdropper.Theoretical and simulation results demonstrate that the proposed algorithm outperforms the random selection method and the method without AN. 展开更多
关键词 PHYSICAL LAYER security polarcodes artificial noise jamming POSITIONS se-lection
下载PDF
Proof of Activity Protocol for IoMT Data Security
3
作者 R.Rajadevi K.Venkatachalam +2 位作者 Mehedi Masud Mohammed A.AlZain Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期339-350,共12页
The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide heal... The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide healthcare services without physical appearance.With the use of sensors,IoMT applications are used in healthcare management.In such applications,one of the most important factors is data security,given that its transmission over the network may cause obtrusion.For data security in IoMT systems,blockchain is used due to its numerous blocks for secure data storage.In this study,Blockchain-assisted secure data management framework(BSDMF)and Proof of Activity(PoA)protocol using malicious code detection algorithm is used in the proposed data security for the healthcare system.The main aim is to enhance the data security over the networks.The PoA protocol enhances high security of data from the literature review.By replacing the malicious node from the block,the PoA can provide high security for medical data in the blockchain.Comparison with existing systems shows that the proposed simulation with BSD-Malicious code detection algorithm achieves higher accuracy ratio,precision ratio,security,and efficiency and less response time for Blockchain-enabled healthcare systems. 展开更多
关键词 Blockchain IoMT malicious code detection security secure data management framework data management POA
下载PDF
Secure Transmission in Downlink Non-Orthogonal Multiple Access Based on Polar Codes 被引量:1
4
作者 Ce Sun Zesong Fei +3 位作者 Bin Li Xinyi Wang Nan Li Lijie Hu 《China Communications》 SCIE CSCD 2021年第9期221-235,共15页
Non-orthogonal multiple access(NOMA)is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband(eMBB)in the fifth generation(... Non-orthogonal multiple access(NOMA)is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband(eMBB)in the fifth generation(5G)communication systems.In this paper,NOMA combined with polar codes is used to achieve secure transmission.Both degraded wiretap channel and non-degraded wiretap channel are considered,where an eavesdropper intercepts the communication between base station(BS)and users.For the degraded wiretap channel scenario,a secure polar encoding scheme is proposed in NOMA systems with power allocation to achieve the maximum secrecy capacity.With regard to the nondegraded wiretap channel,a polar encoding scheme with multiple-input-single-output(MISO)system is proposed,where artificial noise is generated at BS to confuse the eavesdropper’s channel via transmit beamforming.The security and the secure rate are employed respectively in order to measure the secrecy performance.We prove that the proposed schemes for each scenario can achieve the secure rate and can transmit the signal securely and reliably.The simulation results show that the eavesdropper hardly decoding the secure signal when the legitimate receiver can decode the signal with very low block error rate(BLER). 展开更多
关键词 physical layer security polar codes non-orthogonal multiple access artificial noise
下载PDF
Code mechanical solidification and verification in MEMS security devices
5
作者 张卫平 陈文元 +2 位作者 赵小林 李胜勇 姜勇 《Journal of Shanghai University(English Edition)》 CAS 2006年第4期334-338,共5页
The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high c... The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high consequence systems. Based on a study of the running condition of physical code mechanism, VMCM's configuration, ternary encoding method, running action and logic are derived. The cases of multi-level code mechanism are designed and verified with the VMCM method, showing that the presented method is effective. 展开更多
关键词 MEMS (micro-electromechanical systems) security device code mechanical solidification and verification virtual machine of code mechanism (VMCM) ternary system.
下载PDF
Henon CSK Secure Communication System Using Chaotic Turbo Codes 被引量:1
6
作者 周小林 Song +4 位作者 Wentao Liu Jianbo Luo Hanwen 《High Technology Letters》 EI CAS 2002年第3期48-51,共4页
In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. S... In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. Secondly, chaotic turbo encoder/decoder (hard decision) is introduced. Thirdly, this chaotic secure communication system, which comprises the Henon CSK modulation block and chaotic turbo encoder in a serially concatenated form, is shown. Furthermore, a novel two step encryption scheme is proposed, which is based on the chaotic turbo encoded Henon CSK secure communication system. 展开更多
关键词 混沌安全通信 混沌涡轮码 信息安全
下载PDF
A Cross Language Code Security Audit Framework Based on Normalized Representation
7
作者 Yong Chen Chao Xu +1 位作者 Jing Selena He Sheng Xiao 《Journal of Quantum Computing》 2022年第2期75-84,共10页
With the rapid development of information technology,audit objects and audit itself are more and more inseparable from software.As an important means of software security audit,code security audit will become an impor... With the rapid development of information technology,audit objects and audit itself are more and more inseparable from software.As an important means of software security audit,code security audit will become an important aspect of future audit that cannot be ignored.However,the existing code security audit ismainly based on source code,which is difficult to meet the audit needs of more and more programming languages and binary commercial software.Based on the idea of normalized transformation,this paper constructs a cross language code security audit framework(CLCSA).CLCSA first uses compile/decompile technology to convert different highlevel programming languages and binary codes into normalized representation,and then usesmachine learning technology to build a cross language code security audit model based on normalized representation to evaluate code security and find out possible code security vulnerabilities.Finally,for the discovered vulnerabilities,the heuristic search strategy will be used to find the best repair scheme from the existing normalized representation sample library for automatic repair,which can improve the effectiveness of code security audit.CLCSA realizes the normalized code security audit of different types and levels of code,which provides a strong support for improving the breadth and depth of code security audit. 展开更多
关键词 code security audit NORMALIZATION cross language security vulnerabilities
下载PDF
网络环境下基于Erasure Codes的高可靠性存储体系设计 被引量:1
8
作者 贾军博 谷建华 +1 位作者 朱靖飞 张集文 《计算机应用研究》 CSCD 北大核心 2009年第5期1835-1838,共4页
设计了一种基于Erasure Codes的网络环境下的分布式文件存储系统。初步的实验结果证明这种存储体系可以较好地解决人们当前所面临的文件存储的可靠性、安全性等问题。
关键词 分布式存储 数据可靠性 数据安全性 纠错码 加罗华域
下载PDF
Physical Layer Security with Its Applications in 5GNetworks: A Review 被引量:7
9
作者 Li Sun Qinghe Du 《China Communications》 SCIE CSCD 2017年第12期1-14,共14页
5G network is expected to support massive user connections and exponentially increasing wireless services,which makes network security unprecedentedly important.Unlike traditional security-guaranteeing techniques whic... 5G network is expected to support massive user connections and exponentially increasing wireless services,which makes network security unprecedentedly important.Unlike traditional security-guaranteeing techniques which rely heavily on cryptographic approaches at upper layers of the protocol stack,physical-layer security(PLS) solutions fully take advantages of the characteristics of wireless channels to degrade the received signal qualities at the malicious users,and realize keyless secure transmission via signal design and signal processing techniques.PLS avoids the difficulties in the distribution and management of secret keys,and provides flexible security levels through adaptive transmission protocol design.Moreover,PLS techniques match the features of 5G networks well.Therefore,the application of PLS to 5G networks is a promising solution to address the security threats.This article presents a comprehensive review of the state-of-the-art PLS techniques,and discusses their applications in 5G networks.We first summarize the principle and advantages of PLS techniques,and point out the reasons why PLS is suitable for 5G networks.Then,we review the existing PLS methods in literature,and highlight severalPLS solutions that are expected to be applied in 5G networks.Finally,we conclude this article and figure out some further research directions. 展开更多
关键词 5G PHYSICAL layer security an-ti-eavesdropping signal design STATISTICAL se-curity GUARANTEE FOUNTAIN CODING
下载PDF
Maximum two-dimensional (u×v,4,1,3)-OOCs 被引量:2
10
作者 HUANG Yue-mei CHANG Yan-xun 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2013年第3期279-289,共11页
Let Ф(u ×v, k, Aa, Ac) be the largest possible number of codewords among all two- dimensional (u ×v, k, λa, λc) optical orthogonal codes. A 2-D (u× v, k, λa, λ)-OOC with Ф(u× v, k, λ... Let Ф(u ×v, k, Aa, Ac) be the largest possible number of codewords among all two- dimensional (u ×v, k, λa, λc) optical orthogonal codes. A 2-D (u× v, k, λa, λ)-OOC with Ф(u× v, k, λa, λc) codewords is said to be maximum. In this paper, the number of codewords of a maximum 2-D (u × v, 4, 1, 3)-OOC has been determined. 展开更多
关键词 MAXIMUM two-dimensional optical orthogonal code orbit.
下载PDF
Multiple bit upsets mitigation in memory by using improved hamming codes and parity codes 被引量:1
11
作者 祝名 肖立伊 田欢 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2010年第5期726-730,共5页
This paper combines improved Hamming codes and parity codes to assure the reliability of memory in presence of multiple bit upsets with low cost overhead.The redundancy bits of improved Hamming codes will be appended ... This paper combines improved Hamming codes and parity codes to assure the reliability of memory in presence of multiple bit upsets with low cost overhead.The redundancy bits of improved Hamming codes will be appended at the end of data bits,which eliminates the overhead of interspersing the redundancy bits at the encoder and decoder.The reliability of memory is further enhanced by the layout architecture of redundancy bits and data bits.The proposed scheme has been implemented in Verilog and synthesized using the Synopsys tools.The results reveal that the proposed method has about 19% less area penalties and 13% less power consumption comparing with the current two-dimensional error codes,and its latency of encoder and decoder is 63% less than that of Hamming codes. 展开更多
关键词 MEMORY multiple bit upsets improved hamming codes two-dimensional error codes
下载PDF
Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem 被引量:1
12
作者 Ramadhan J.Mstafa 《Computers, Materials & Continua》 SCIE EI 2022年第8期3349-3368,共20页
The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breache... The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breaches of privacy and data security.When it comes to protecting private information in today’s Internet era,digital steganography is vital.Many academics are interested in digital video because it has a great capability for concealing important data.There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data.The visual imperceptibility,robustness,and embedding capacity of these approaches are all challenges that must be addressed.In this paper,a novel solution to reversible video steganography based on Discrete Wavelet Transform(DWT)and Quick Response(QR)codes is proposed to address these concerns.In order to increase the security level of the suggested method,an enhanced ElGamal cryptosystem has also been proposed.Prior to the embedding stage,the suggested method uses the modified ElGamal algorithm to encrypt secret QR codes.Concurrently,it applies two-dimensional DWT on the Y-component of each video frame resulting in Approximation(LL),Horizontal(LH),Vertical(HL),and Diagonal(HH)sub-bands.Then,the encrypted Low(L),Medium(M),Quantile(Q),and High(H)QR codes are embedded into the HL sub-band,HHsub-band,U-component,and V-component of video frames,respectively,using the Least Significant Bit(LSB)technique.As a consequence of extensive testing of the approach,it was shown to be very secure and highly invisible,as well as highly resistant to attacks from Salt&Pepper,Gaussian,Poisson,and Speckle noises,which has an average Structural Similarity Index(SSIM)of more than 0.91.Aside from visual imperceptibility,the suggested method exceeds current methods in terms of Peak Signal-to-Noise Ratio(PSNR)average of 52.143 dB,and embedding capacity 1 bpp. 展开更多
关键词 Reversible video steganography QR code security ElGamal cryptosystem DWT
下载PDF
Homomorphic Hashing Verification for Wireless Sensor Networks Rateless Codes Over-the-Air Programming
13
作者 Hao He Weidong Yi +1 位作者 Ming Li Yongrui Chen 《Journal of Beijing Institute of Technology》 EI CAS 2019年第1期109-118,共10页
The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of... The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of data by homomorphic hash function,and then it compares the hash value with the receiving message digest.Because the feedback channel is deliberately removed during the distribution process,the rateless codes are often vulnerable when they face security issues such as packets contamination or attack.This method prevents contaminating or attack on rateless codes and reduces the potential risks of decoding failure.Compared with the SHA1 and MD5,HHA,which has a much shorter message digest,will deliver more data.The simulation results show that to transmit and verify the same amount of OAP data,HHA method sends 17.9% to 23.1%fewer packets than MD5 and SHA1 under different packet loss rates. 展开更多
关键词 wireless sensor network(WSN) over-the-air PROGRAMMING rateless codes homomorphic HASHING security
下载PDF
Development of Hybrid ARQ Protocol for the Quantum Communication System on Stabilizer Codes
14
作者 Jiaxin Li Zhongwen Guo Hongyang Ma 《China Communications》 SCIE CSCD 2021年第2期40-48,共9页
In this paper,we develop a novel hybrid automatic-repeat-request(ARQ)protocol for the quantum communication system using quantum stabilizer codes.The quantum information is encoded by stabilizer codes to against the c... In this paper,we develop a novel hybrid automatic-repeat-request(ARQ)protocol for the quantum communication system using quantum stabilizer codes.The quantum information is encoded by stabilizer codes to against the channel noise.The twophoton entangled state is prepared for codeword secure transmission.Hybrid ARQ protocol rules the recognition and retransmission of error codewords.In this protocol,the property of quantum entangled state ensures the security of information,the theory of hybrid ARQ system improves the reliability of transmission,the theory of quantum stabilizer codes corrects the flipping errors of codewords.Finally,we verify the security and throughput efficiency of this protocol. 展开更多
关键词 quantum communication system hybrid ARQ quantum stabilizer codes reliability security
下载PDF
A Security Sensitive Function Mining Approach Based on Precondition Pattern Analysis
15
作者 Zhongxu Yin Yiran Song +1 位作者 Huiqin Chen Yan Cao 《Computers, Materials & Continua》 SCIE EI 2020年第5期1013-1029,共17页
Security-sensitive functions are the basis for building a taint-style vulnerability model.Current approaches for extracting security-sensitive functions either don’t analyze data flow accurately,or not conducting pat... Security-sensitive functions are the basis for building a taint-style vulnerability model.Current approaches for extracting security-sensitive functions either don’t analyze data flow accurately,or not conducting pattern analyzing of conditions,resulting in higher false positive rate or false negative rate,which increased manual confirmation workload.In this paper,we propose a security sensitive function mining approach based on preconditon pattern analyzing.Firstly,we propose an enhanced system dependency graph analysis algorithm for precisely extracting the conditional statements which check the function parameters and conducting statistical analysis of the conditional statements for selecting candidate security sensitive functions of the target program.Then we adopt a precondition pattern mining method based on conditional statements nomalizing and clustering.Functions with fixed precondition patterns are regarded as security-sensitive functions.The experimental results on four popular open source codebases of different scales show that the approach proposed is effective in reducing the false positive rate and false negative rate for detecting security sensitive functions. 展开更多
关键词 code mining security sensitive function function preconditions single-linkage clustering
下载PDF
Security Analysis of Subspace Network Coding
16
作者 Yantao Liu Yasser Morgan 《Journal of Information Security》 2018年第1期85-94,共10页
This paper analyzed the security of constant dimensional subspace code against wiretap attacks. The security was measured in the probability with which an eavesdropper guessed the source message successfully. With the... This paper analyzed the security of constant dimensional subspace code against wiretap attacks. The security was measured in the probability with which an eavesdropper guessed the source message successfully. With the methods of linear algebra and combinatorics, an analytic solution of the probability was obtained. Performance of subspace code was compared to several secure network coding schemes from the perspective of security, flexibility, complexity, and independence, etc. The comparison showed subspace code did not have perfect security, but it achieved probabilistic security with low complexity. As a result, subspace code was suitable to the applications with limited computation and moderate security requirement. 展开更多
关键词 NETWORK security WIRETAP ATTACKS SUBSPACE code NETWORK Coding
下载PDF
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
17
作者 Moad Mowafi Lo'ai Tawalbeh +1 位作者 Walid Aljoby Mohammad Al-Rousan 《Journal of Information Security》 2012年第4期272-280,共9页
Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is sus... Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is susceptible to attacks and, due to the nature of WSNs, security mechanisms used in wired networks and other types of wireless networks are not suitable for WSNs. In this paper, we propose a mechanism to assure information security against security attacks and particularly node capturing attacks. We propose a cluster security management protocol, called Cryptographic Checksum Clustering Security Management (C3SM), to provide an efficient decentralized security management for hierarchal networks. In C3SM, every cluster selects dynamically and alternately a node as a cluster security manager (CSM) which distributes a periodic shared secrete key for all nodes in the cluster. The cluster head, then, authenticates identity of the nodes and derive a unique pairwise key for each node in the cluster. C3SM provides sufficient security regardless how many nodes are compromised, and achieves high connectivity with low memory cost and low energy consumption. Compared to existing protocols, our protocol provides stronger resilience against node capture with lower key storage overhead. 展开更多
关键词 Wireless Sensor Networks security MESSAGE Authentication code CRYPTOGRAPHIC Node CAPTURE ATTACK
下载PDF
Emergence of Plastidial Intergenic Spacers as Suitable DNA Barcodes for Arid Medicinal Plant <i>Rhazya stricta</i>
18
作者 Samia A. Khan Mohammed N. Baeshen +1 位作者 Hassan A. Ramadan Nabih A. Baeshen 《American Journal of Plant Sciences》 2017年第8期1774-1789,共16页
The desert plant Rhazya stricta has anticancer and antimicrobial properties, and is widely used in indigenous medicines of Saudi Arabia. However, the therapeutic benefits rely on an accurate identification of this spe... The desert plant Rhazya stricta has anticancer and antimicrobial properties, and is widely used in indigenous medicines of Saudi Arabia. However, the therapeutic benefits rely on an accurate identification of this species. The authenticity of R. stricta and other medicinal plants and herbs procured from local markets can be questionable due to a lack of clear phenotypic traits. DNA barcoding is an emerging technology for rapid and accurate species identification. In this study, six candidate chloroplastid barcodes were investigated for the authentication of R. stricta. We compared the DNA sequences from fifty locally collected and five market samples of R. stricta with database sequences of R. stricta and seven closely related species. We found that the coding regions matK, rbcL, rpoB, and rpoC1 were highly similar among the taxa. By contrast, the intergenic spacers psbK-psbI and atpF-atpH were variable loci distinct for the medicinal plant R. stricta. psbK-psbI clearly discriminated R. stricta samples as an efficient single locus marker, whereas a two-locus marker combination comprising psbK-psbI + atpF-atpH was also promising according to results from the Basic Local Alignment Search Tool and a maximum likelihood gene tree generated using PHyML. Two-dimensional DNA barcodes (i.e., QR codes) for the psbK-psbI and psbK-psbI + atpF-atpH regions were created for the validation of fresh or dried R. stricta samples. 展开更多
关键词 Rhazya STRICTA Medicinal Plant DNA BARCODING matK rbcl rpoB rpoC1 atpF-atpH psbK-psbI two-dimensional DNA Barcode QR code
下载PDF
Security in Multicast Over α-μ Fading Channels with Orthogonal Frequency Division Multiplexing
19
作者 Mohammad Mahmud Hasan Md. Zahurul Islam Sarkar 《Journal of Computer and Communications》 2022年第11期72-90,共19页
The orthogonal space-frequency block coding (OSFBC) with orthogonal frequency division multiplexing (OFDM) system reduces complexity in the receiver which improves the system performance significantly. Motivated by th... The orthogonal space-frequency block coding (OSFBC) with orthogonal frequency division multiplexing (OFDM) system reduces complexity in the receiver which improves the system performance significantly. Motivated by these advantages of OSFBC-OFDM system, this paper considers a secure wireless multicasting scenario through multiple-input multiple-output (MIMO) OFDM system employing OSFBC over frequency selective α-μ fading channels. The authors are interested to protect the desired signals from eavesdropping considering the impact of the number of multicast users and eavesdroppers, and the fading parameters α and μ. A mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multi-casting (SOPM) to ensure the security in the presence of multiple eaves-droppers. The results show that the security in MIMO OSFBC OFDM system over α-μ fading is more sensitive to the magnitude of α and μ and this effect increases in the high signal-to-noise ratio (SNR) region of the main channel. 展开更多
关键词 Orthogonal Space-Frequency Block Coding Orthogonal Frequency Division Multiplexing Probability of Non-Zero Secrecy Multicast Capacity secure Outage Probability for Multicasting
下载PDF
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
20
作者 A. Saravanaselvan B. Paramasivan 《Circuits and Systems》 2016年第9期2234-2241,共9页
In-network data aggregation is severely affected due to information in transmits attack. This is an important problem since wireless sensor networks (WSN) are highly vulnerable to node compromises due to this attack. ... In-network data aggregation is severely affected due to information in transmits attack. This is an important problem since wireless sensor networks (WSN) are highly vulnerable to node compromises due to this attack. As a result, large error in the aggregate computed at the base station due to false sub aggregate values contributed by compromised nodes. When falsified event messages forwarded through intermediate nodes lead to wastage of their limited energy too. Since wireless sensor nodes are battery operated, it has low computational power and energy. In view of this, the algorithms designed for wireless sensor nodes should be such that, they extend the lifetime, use less computation and enhance security so as to enhance the network life time. This article presents Vernam Cipher cryptographic technique based data compression algorithm using huff man source coding scheme in order to enhance security and lifetime of the energy constrained wireless sensor nodes. In addition, this scheme is evaluated by using different processor based sensor node implementations and the results are compared against to other existing schemes. In particular, we present a secure light weight algorithm for the wireless sensor nodes which are consuming less energy for its operation. Using this, the entropy improvement is achieved to a greater extend. 展开更多
关键词 In-Network Data Aggregation security Attacks Vernam Cipher Cryptographic Technique Huffman Source Coding ENTROPY
下载PDF
上一页 1 2 57 下一页 到第
使用帮助 返回顶部