• Aucun résultat trouvé

[PDF] Top 20 State Based Key Hop Protocol: A Lightweight Security Protocol for Wireless Networks

Has 10000 "State Based Key Hop Protocol: A Lightweight Security Protocol for Wireless Networks" found on our website. Below are the top 20 most common "State Based Key Hop Protocol: A Lightweight Security Protocol for Wireless Networks".

State Based Key Hop Protocol: A Lightweight Security Protocol for Wireless Networks

State Based Key Hop Protocol: A Lightweight Security Protocol for Wireless Networks

... basic protocol as described herein, we believe is robust, internally consistent, and ...in a novel state based way so as to provide cheap and robust security without additional ... Voir le document complet

9

Performance of State Based Key Hop (SBKH) Protocol for Security on Wireless Networks

Performance of State Based Key Hop (SBKH) Protocol for Security on Wireless Networks

... 802.11 security proposals namely WEP, WPA ...out state based encryption using RC4 technique and does not require state initialization for every packet which contributes to significant ... Voir le document complet

7

SAPC : a Secure Aggregation Protocol for Cluster-based wireless sensor networks

SAPC : a Secure Aggregation Protocol for Cluster-based wireless sensor networks

... al. Protocol In [10], Przydatek et al. present a secure information aggregation protocol for ...methods for computing the median and the average of measurements, finding the ... Voir le document complet

16

Random Walk Based Routing Protocol for Wireless Sensor Networks

Random Walk Based Routing Protocol for Wireless Sensor Networks

... of a large number of sensor nodes and a smaller number of sink nodes to gather, process and control ...data. A packet generated at any sensor node per- forms a random walk until it reaches ... Voir le document complet

11

A cross-layer MAC and routing protocol based on slotted Aloha for Wireless Sensor Networks

A cross-layer MAC and routing protocol based on slotted Aloha for Wireless Sensor Networks

... Abstract Wireless Sensor Networks (WSN) consist of a large number of sensors which have limited battery ...paper, a cross- layer routing protocol (PLOSA) is designed to oer a ... Voir le document complet

15

A Location Routing Protocol Based on Smart Antennas for Wireless Sensor Networks

A Location Routing Protocol Based on Smart Antennas for Wireless Sensor Networks

... [36] protocol is an energy-aware location-based routing algorithm originally designed for ad hoc networks but applicable to sensor networks as ...The protocol first divides the ... Voir le document complet

103

A Distributed Consensus-based  Clock Synchronization Protocol for Wireless Sensor Networks

A Distributed Consensus-based Clock Synchronization Protocol for Wireless Sensor Networks

... define a distributed consensus problem as the problem of making the individual nodes of a network to reach a consensus (or agreement) upon a common value of a quantity of interest ... Voir le document complet

26

Cross-layered Synchronization Protocol for Wireless Sensor Networks

Cross-layered Synchronization Protocol for Wireless Sensor Networks

... sensors. For many years, high speed wired computer networks have concentrated a large part of the research about time ...Time Protocol (NTP) is the widely spread clock synchronization ... Voir le document complet

7

Medium access protocol (MAC) design for wireless multi-hop ad hoc and sensor networks

Medium access protocol (MAC) design for wireless multi-hop ad hoc and sensor networks

... providing a description of key challenges that need to be addressed while designing a MAC protocol for wireless ad hoc and sensor ...then, a review on the masterpiece ... Voir le document complet

123

Dynamic aggregation protocol for wireless sensor networks

Dynamic aggregation protocol for wireless sensor networks

... is a key technique to minimize energy consumption in large scale information ...into a single frame ...within a specific zone, such as a cluster, sends its data packet to a ... Voir le document complet

7

LATe: A Lightweight Authenticated Time Synchronization Protocol for IoT

LATe: A Lightweight Authenticated Time Synchronization Protocol for IoT

... HE A RT FOR S ECURE T IME S YNCHRONIZATION Prominent standardized time synchronization protocols are the IETF Network Time Protocol (NTP) [2], IEEE 1588 Precision-Time-Protocol (PTP), and ... Voir le document complet

7

Adaptive Reliable Routing Protocol for Wireless Sensor Networks

Adaptive Reliable Routing Protocol for Wireless Sensor Networks

... —Many Wireless Sensor Networks (WSN) applications success is contingent upon the reliable delivery of high-priority events from many scattered sensors to one or more sink ...mechanisms for ... Voir le document complet

5

A new protocol for securing wireless sensor networks against nodes replication attacks

A new protocol for securing wireless sensor networks against nodes replication attacks

... compute a symmetric secret pair-wise key K uv = e(H 1 (P os u ), LK v ) = e(LK u , H 1 (P os v )) (7) As we can see, Zhang et ...al. protocol achieves a strong security, by preventing ... Voir le document complet

8

CDEEC: A Connectivity Degree-Based Energy Efficient Clustering Protocol for Wireless Sensor Networks

CDEEC: A Connectivity Degree-Based Energy Efficient Clustering Protocol for Wireless Sensor Networks

... If a node elects itself as a CH, it sends a tentative message including node ID, status and ...If a node completes HEED execution without being assigned to a final CH, it considers ... Voir le document complet

8

A Lightweight IoT Security Protocol

A Lightweight IoT Security Protocol

... propose a secure architecture based on the DTLS (Datagram Transport Layer Security) protocol for ...provides a mutual authentication and symmetric key exchange for ... Voir le document complet

9

A Trusted Lightweight Synchronisation Protocol for Wireless Ad-hoc Networks

A Trusted Lightweight Synchronisation Protocol for Wireless Ad-hoc Networks

... SiSP protocol is a very simple protocol not implementing safety or security countermeasures and as consequences is very sensitive to malicious ...have a fixed clock to ... Voir le document complet

7

A Cross-Layer Medium Access Control and Routing Protocol for Wireless Sensor Networks

A Cross-Layer Medium Access Control and Routing Protocol for Wireless Sensor Networks

... RBF protocol, which combines the tasks of MAC and routing via cross-layer design, to deliver sensing data from sensor nodes to the ...as a parameter for the receiver-based contentions among ... Voir le document complet

7

A new resilient key management protocol for wireless sensor networks

A new resilient key management protocol for wireless sensor networks

... Abstract. Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few ...fundamental security problem in WSN is key ... Voir le document complet

15

State Based Key Hop (SBKH) Protocol

State Based Key Hop (SBKH) Protocol

... IBSS networks have a dramatic simplification which can ease this ...use a single Base Key Pair, the same Base Key List (if any), the same I- Offset, and the same Key ...RC4 ... Voir le document complet

15

CoopGeo : a beaconless geographic cross-layer protocol for cooperative wireless ad hoc networks

CoopGeo : a beaconless geographic cross-layer protocol for cooperative wireless ad hoc networks

... as a properly designed MAC protocol can fa- cilitate routing process at the network layer, in particular the beaconless geographic routing 1 (BLGR) ...solutions for wireless ad hoc and sensor ... Voir le document complet

14

Show all 10000 documents...