A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
The communication and computation cost of wireless security
2011
Proceedings of the fourth ACM conference on Wireless network security - WiSec '11
The next section describes the four protocols we have chosen for our evaluation. These protocols are secret key, public key, hash and stream-cipher based. Finally, we conclude in section 6. ...
heavy public-key operations but only need a small amount of communication. The goal of this paper is to get some insight into this com-putation-communication trade-off. ...
doi:10.1145/1998412.1998414
dblp:conf/wisec/SingeleeSBV11
fatcat:wg2mnnekdvcczodvtvy3di6fnm
Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols with RSA Algorithm
2013
IOSR Journal of Computer Engineering
The concept of use multiple keys with RSA algorithms using PKM (Privacy & Key management) protocol has been used for secure communication. ...
For secure the communication in Wimax various algorithms and security protocols are used. ...
SECURITY PROTOCOLS There are several protocols proposed for security in the wireless networks. ...
doi:10.9790/0661-1411316
fatcat:alkhhsbmrnarff6ovusytuj2cm
Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks
[chapter]
2003
Lecture Notes in Computer Science
Traditionally, researchers have focused on security, complexity, and throughput metrics while designing security protocols for wired networks. ...
Based on this study we present techniques to optimize energy consumed by secure wireless session negotiation protocols. ...
An optimized IPSec secure session negotiation protocol based on revised public key encryption is most suitable for wireless environment since it allows client to send URL of its certificate for energy-efficiency ...
doi:10.1007/978-3-540-39762-5_42
fatcat:bnuwlsd6xzfmhcf5z5s5ig2inu
Wireless Public Key Infrastructure for Mobile Phones
2012
International journal of network security and its applications
In this paper, a discussion of public key infrastructure and an experimental set up for Wireless Public key Infrastructure for mobile phones are made. ...
This arises a need for the development of a Wireless Public Key Infrastructure (WPKI) that provides the similar security level as the wired PKI suitable for mobile phone. ...
Following paragraphs discuss how wireless public key infrastructure can be deployed for mobile phones. ...
doi:10.5121/ijnsa.2012.4608
fatcat:v5ikpbwejbbzhi5cguh7gn3loy
User authentication scheme based on self-certified public-key for next generation wireless network
2008
2008 International Symposium on Biometrics and Security Technologies
Consequently, it is more appropriate for 4G wireless system. Index Terms -Security of Wireless network, Authentication, Self-certified public-key, 4G wireless network. ...
In this paper, a AKA scheme (SPAKA) based on self-certified public-key is proposed for the coming 4G system to reduce the storage, computation and communicational load of existing public-key based user ...
PUBLIC-KEY BROADCAST PROTOCOL (PKBP) Recently, the public key infrastructure (PKI) has been gradually introducing in wireless network to provide enhanced scalability and advanced security for mobile user ...
doi:10.1109/isbast.2008.4547638
fatcat:jg7mp2gugncv3po667x2ai4w7y
A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications
2005
Journal of Zhejiang University: Science A
key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols. ...
for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public ...
MD5 or SHA) to construct our new mutual authentication and session key agreement protocol appropriate for wireless communications. ...
doi:10.1631/jzus.2005.a0399
fatcat:ckhwg4o76jahxd7y4iuuywjhzu
Secure and efficient key management protocol (SEKMP) for wireless sensor networks
2014
Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems - ANCS '14
As a result, the sensors are left unattended and become a potential target for an adversary. Therefore, we propose a highly Secure and Efficient Key Management Protocol for WSN, called SEKMP. ...
The proposed protocol (SEKMP) adapts a new key management approach by leveraging the advantages of asymmetric cryptography and employs them in a very efficient way for delivering the session key to sensor ...
PU S
Public key used in the sink node.
PR N
Private key used in each node.
K S
Session key used to encrypt the communication.
C
Ciphertext.
M
Plaintext. ...
doi:10.1145/2658260.2661775
dblp:conf/ancs/AlshammariE14
fatcat:eurbkpriuvf6va7wp7y26x4u3i
Novel Protocol and Its Implementation QKD in Wi-Fi Networks
2009
2009 Eighth IEEE/ACIS International Conference on Computer and Information Science
In this paper, we have extended our previous research work to a new protocol with the method of integrating quantum cryptography for key distribution in 802.11 wireless networks. ...
However, providing secure communication for wireless networks has become one of the prime concerns. ...
Quantum cryptography has the potential to offer this much needed secured data communications for 802.11 wireless networks. ...
doi:10.1109/icis.2009.122
dblp:conf/ACISicis/HuangWS09
fatcat:rvvl7j3bn5feleca7ojnm7zwxe
A Signcryption based Light Weight Key Exchange Protocol
2012
Physics Procedia
for flexible dynamic deployment, i.e., wireless mesh networks, wireless sensor networks, mobile ad hoc networks, etc., in computational cost and communicational overhead and traditional digital signature ...
Traditional cryptography based authenticated Diffie-Hellman key exchange protocols expose the problems of efficiency and privacy since signature-then-encryption is heavy to wireless communication special ...
Secure and light weight key exchange protocols are highly pursued features in wireless communication special for flexible dynamic deployment, i.e., wireless mesh networks, wireless sensor networks, mobile ...
doi:10.1016/j.phpro.2012.03.147
fatcat:zxhztu6t3bg5xezjwom3irytjq
A Survey on Secure Routing Protocols in Wireless Sensor Networks
2016
International Journal of Wireless and Microwave Technologies
Secondly, we have provided a taxonomy of secure routing protocols of WSNs. Thirdly, we have provided a qualitative comparison of existing secure routing protocols. ...
Wireless Sensor Networks (WSNs) are typically formed by the collaboration of the large amount of partial sensor nodes, which are connected through a wireless medium. ...
Conclusions Wireless sensor network comprises of resource constraint sensor nodes. That is why, designing and selecting an appropriate secure routing protocol for the network is a tough task. ...
doi:10.5815/ijwmt.2016.03.02
fatcat:vglqvqmmzfhnla5dvtjl6qcz2i
Facing the challenge of wireless security
2001
Computer
With this in mind, the WPKI (wireless PKI) protocol offers a slimmed-down version of PKI optimized for wireless communications. ...
Senders of digital certificates keep their private key secure but make the public key available to people with whom they communicate. ...
doi:10.1109/2.933495
fatcat:fh7ggzklxrgcnhtv4jhfyc522i
Security and resilience for smart devices and applications
2014
EURASIP Journal on Wireless Communications and Networking
There are many open questions for these challenging issues such as security of protocols and applications, secure architecture, frameworks and methodologies for next generation wireless networks and respective ...
Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices. ...
However, special thanks go to Professor Luc Vandendorpe, Editor-in-Chief, for approving and making this issue possible and to the staff of EURASIP Journal on Wireless Communications and Networks for their ...
doi:10.1186/1687-1499-2014-123
fatcat:ljmyjdcaezf7ngavdybaz3ftbm
Quantum Cryptography for Wireless Network Communications
2009
2009 4th International Symposium on Wireless Pervasive Computing
However, providing secure communication for wireless networks has become one of the prime concerns. ...
⎯ It is well known that wireless networks have become one of the most important part used communication systems, in particular for ubiquitous computing. ...
Quantum cryptography has the potential to offer this much needed secured data communications for 802.11 wireless networks. ...
doi:10.1109/iswpc.2009.4800604
fatcat:zgdvrgsisra6jfcv7ay5szzzge
Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography
2010
2010 Fourth International Conference on Network and System Security
Therefore, providing secure communication for wireless networks has become one of the prime concerns. ...
Our contributions in this paper are as follows: (1) We discussed how QKD can be used in IEEE 802.11 wireless networks to securely distribute the keys. (2) We use new protocol QKD. (3) We introduced a method ...
Once the photon transmission is over, the rest of the communication takes place in public channel (eg: internet, wireless medium). ...
doi:10.1109/nss.2010.17
dblp:conf/nss/HuangWS10
fatcat:ieerxiblq5b2rkuy66cublyhni
Implementation of QKD in 802.11 Networks
2009
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
However, providing secure communication for wireless networks has become one of the prime concerns. ...
In this paper, we shall extend our previous research work to a new method of integrating quantum cryptography for key distribution in 802.11 wireless networks. ...
Quantum cryptography has the potential to offer this much needed secured data communications for 802.11 wireless networks. ...
doi:10.1109/nswctc.2009.48
fatcat:iihp3lcg3ba3tkudp3oe7ukm5u
« Previous
Showing results 1 — 15 out of 64,804 results