搜索结果: 1-15 共查到“军事学 sensor”相关记录44条 . 查询时间(0.093 秒)
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion
Intrusion-Tolerant Privacy-Preserving Sensor Fusion
2018/12/3
We design and implement, PwoP, an efficient and scalable system for intrusion-tolerant and privacy-preserving multi-sensor fusion. PwoP develops and unifies techniques from dependable distributed syst...
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting
Smartphones PIN Sensor
2017/12/6
A range of zero-permission sensors are found in modern smartphones to enhance user experience. These sensors can lead to unintentional leakage of user private data. In this paper, we combine leakage f...
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
conditional privacy-preserving vehicular sensor networks
2016/7/15
Secure aggregate signature schemes have attracted more concern due to their wide application in resource constrained environment. Recently, Horng et al. [S. J. Horng et al., An efficient certificatele...
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
user authentication key agreement cryptanalysis
2016/1/27
Recently, Farasha et al. proposed an efficient user authentication and key
agreement scheme for heterogeneous wireless sensor network tailored for the Internet
of Things environment. By using BAN-lo...
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks
cryptographic protocols wireless sensor networks
2016/1/26
Recently, Shm et al. Proposed an efficient identity-based broadcast authentication
scheme based on Tso et al.’s IBS scheme with message recovery to achieve security
requirements in wireless sensor n...
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks
Key establishment bilinear pairings Session key
2016/1/26
The article proposes one-pass authenticated key establishment protocol
in random oracles for Wireless Sensor Networks. Security of the protocol relies on
Computational Diffie-Hellman Problem on Bili...
Resilient Aggregation in Simple Linear Sensor Networks
wireless sensor network resilient aggregation linear network
2016/1/23
A sensor network is a network comprised of many small, wireless, resourcelimited nodes that sense data about their environment and report readings to a base station. One technique to conserve power ...
EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor
AES implementation smart cards
2016/1/8
This paper presents a standard-cell-based semi-automatic
design methodology of a new conceptual countermeasure against electromagnetic
(EM) analysis and fault-injection attacks. The countermeasure
...
Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks
Hybrid Anomaly Misdirection Blackhole
2016/1/7
Security is the biggest concern in Wireless Sensor Networks (WSNs)
especially for the ones which are deployed for military applications and
monitoring. They are prone to various attacks which degrad...
SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node
TinyECC 2.0 Side Channel Analysis SEMA
2015/12/31
TinyECC 2.0 is an open source library for Elliptic Curve Cryptography (ECC) in wireless sensor networks. This paper analyzes the side channel susceptibility of TinyECC 2.0 on a LOTUS sensor node platf...
Pairing Based Mutual Healing in Wireless Sensor Networks
Wireless sensor networks Mutual healing Bi-linear Pairing
2015/12/30
In Wireless Sensor Networks(WSNs), a group of users communicating on an unreliable wireless channel can use a group secret. For each session, group manager broadcasts a message containing some keying ...
Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation
applications public-key cryptography
2015/12/24
We consider a sensor network setting in which the sensed samples are encrypted individually using different keys before being streamed to a cloud storage. For large systems with high capacity, e.g. ge...
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network
network homomorphic WSN Wireless Sensor Network
2015/12/22
Wireless Sensor Networks (WSN) has become more
and more important in many applications especially those required
a high level of security such as: commercial, military
and telemedicine applications...
Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks
Sensor Networks Key Establishment
2014/3/6
The article proposes a provably secure authenticated multiple key establishment protocol for Wireless Sensor Network. Security of the protocol is based on the computational infeasiblity of solving Ell...
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks
Cryptanalysis Cryptographic Authentication Network Security
2014/3/6
In 2012, Alagheband and Aref presented a dynamic and secure key manage ment model for hierarchical heterogeneous sensor networks. They proposed a signcryption algorithm which is the main building bloc...