Grover et al., 2015 - Google Patents
A survey of broadcast authentication schemes for wireless networksGrover et al., 2015
- Document ID
- 17183973999635746773
- Author
- Grover K
- Lim A
- Publication year
- Publication venue
- Ad Hoc Networks
External Links
Snippet
With the increase in the usage of wireless networks and their applications where broadcast transmission is widely used, it has become critical to authenticate broadcast messages. Several broadcast authentication techniques are currently available. However, no scheme is …
- 238000000034 method 0 abstract description 65
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC [Transmission power control]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Grover et al. | A survey of broadcast authentication schemes for wireless networks | |
Xiao et al. | A survey of key management schemes in wireless sensor networks | |
Zhou et al. | Securing wireless sensor networks: a survey | |
Kavitha | Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment | |
Mahalle et al. | Identity establishment and capability based access control (iecac) scheme for internet of things | |
US8397062B2 (en) | Method and system for source authentication in group communications | |
Nikravan et al. | A lightweight defense approach to mitigate version number and rank attacks in low-power and lossy networks | |
Yasmin et al. | An authentication framework for wireless sensor networks using identity-based signatures | |
Raffo | Security schemes for the OLSR protocol for ad hoc networks | |
Lavanya et al. | LWDSA: light-weight digital signature algorithm for wireless sensor networks | |
Sudharson et al. | Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm. | |
Chatterjee et al. | A secure and efficient authentication protocol in wireless sensor network | |
Ben‐Othman et al. | IBC‐HWMP: a novel secure identity‐based cryptography‐based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11 s | |
Baburaj | Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks | |
Arafath et al. | Incorporating privacy and security in military application based on opportunistic sensor network | |
Komninos et al. | Authentication in a layered security approach for mobile ad hoc networks | |
Yu et al. | Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN. | |
Ouada et al. | Lightweight identity-based authentication protocol for wireless sensor networks | |
Mansour et al. | Security architecture for multi-hop wireless sensor networks | |
Nasiraee et al. | A new three party key establishment scheme: Applicable for internet-enabled sensor networks | |
Gahlin | Secure ad hoc networking | |
Wang et al. | A CFL‐Based Key Management Scheme for Routing‐Driven Internet of Things | |
Ren et al. | Idsrf: Id-based secure routing framework for wireless ad-hoc networks | |
Abuhaiba et al. | Securing zone routing protocol in Ad-hoc networks | |
Limbasiya et al. | An enhanced message verification system for vehicle-to-vehicle communication |