Nothing Special   »   [go: up one dir, main page]

Grover et al., 2015 - Google Patents

A survey of broadcast authentication schemes for wireless networks

Grover et al., 2015

Document ID
17183973999635746773
Author
Grover K
Lim A
Publication year
Publication venue
Ad Hoc Networks

External Links

Snippet

With the increase in the usage of wireless networks and their applications where broadcast transmission is widely used, it has become critical to authenticate broadcast messages. Several broadcast authentication techniques are currently available. However, no scheme is …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W52/00Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC [Transmission power control]

Similar Documents

Publication Publication Date Title
Grover et al. A survey of broadcast authentication schemes for wireless networks
Xiao et al. A survey of key management schemes in wireless sensor networks
Zhou et al. Securing wireless sensor networks: a survey
Kavitha Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment
Mahalle et al. Identity establishment and capability based access control (iecac) scheme for internet of things
US8397062B2 (en) Method and system for source authentication in group communications
Nikravan et al. A lightweight defense approach to mitigate version number and rank attacks in low-power and lossy networks
Yasmin et al. An authentication framework for wireless sensor networks using identity-based signatures
Raffo Security schemes for the OLSR protocol for ad hoc networks
Lavanya et al. LWDSA: light-weight digital signature algorithm for wireless sensor networks
Sudharson et al. Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm.
Chatterjee et al. A secure and efficient authentication protocol in wireless sensor network
Ben‐Othman et al. IBC‐HWMP: a novel secure identity‐based cryptography‐based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11 s
Baburaj Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks
Arafath et al. Incorporating privacy and security in military application based on opportunistic sensor network
Komninos et al. Authentication in a layered security approach for mobile ad hoc networks
Yu et al. Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN.
Ouada et al. Lightweight identity-based authentication protocol for wireless sensor networks
Mansour et al. Security architecture for multi-hop wireless sensor networks
Nasiraee et al. A new three party key establishment scheme: Applicable for internet-enabled sensor networks
Gahlin Secure ad hoc networking
Wang et al. A CFL‐Based Key Management Scheme for Routing‐Driven Internet of Things
Ren et al. Idsrf: Id-based secure routing framework for wireless ad-hoc networks
Abuhaiba et al. Securing zone routing protocol in Ad-hoc networks
Limbasiya et al. An enhanced message verification system for vehicle-to-vehicle communication