Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
The access control mechanism is an important security service to regulate the deployment of a new node within a WSN. As WSN are resource-constrained, access control schemes based on Elliptical Curve Cryptography are found to be more efficient and suitable.
In this study, we propose a new access control method based on elliptic curve cryptography and the chameleon hash function. This method addresses the security ...
People also ask
In this study, we propose a new access control method based on elliptic curve cryptography and the chameleon hash function. This method addresses the security ...
Wireless sensor networks (WSNs) contain a large number of resource-constrained and energy-limited sensor nodes that are.
Feb 26, 2018 · In the network model of access control, the access request message generated by the Internet user should satisfy confidentiality, integrity, ...
Jan 1, 2015 · In this study, we propose a new access control method based on elliptic curve cryptography and the chameleon hash function. This method ...
May 31, 2024 · An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function. January 2016 · Journal of Sensors.
Jun 28, 2024 · In this article, we proposed a novel method to complete authentication in wireless sensor networks based on four factors. Homomorphic ...
This study offers an improved security mechanism, taking the application, security level, and bit error rate into account for wireless sensor networks.
This paper presents various security-enhancing techniques such as LASER based Security system using WSN, RSSI-LSSVR algorithm, cryptography techniques.