Filters








64,804 Hits in 3.7 sec

The communication and computation cost of wireless security

Dave Singelee, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede
2011 Proceedings of the fourth ACM conference on Wireless network security - WiSec '11  
The next section describes the four protocols we have chosen for our evaluation. These protocols are secret key, public key, hash and stream-cipher based. Finally, we conclude in section 6.  ...  heavy public-key operations but only need a small amount of communication. The goal of this paper is to get some insight into this com-putation-communication trade-off.  ... 
doi:10.1145/1998412.1998414 dblp:conf/wisec/SingeleeSBV11 fatcat:wg2mnnekdvcczodvtvy3di6fnm

Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols with RSA Algorithm

Gurpreet Singh
2013 IOSR Journal of Computer Engineering  
The concept of use multiple keys with RSA algorithms using PKM (Privacy & Key management) protocol has been used for secure communication.  ...  For secure the communication in Wimax various algorithms and security protocols are used.  ...  SECURITY PROTOCOLS There are several protocols proposed for security in the wireless networks.  ... 
doi:10.9790/0661-1411316 fatcat:alkhhsbmrnarff6ovusytuj2cm

Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks [chapter]

Ramesh Karri, Piyush Mishra
2003 Lecture Notes in Computer Science  
Traditionally, researchers have focused on security, complexity, and throughput metrics while designing security protocols for wired networks.  ...  Based on this study we present techniques to optimize energy consumed by secure wireless session negotiation protocols.  ...  An optimized IPSec secure session negotiation protocol based on revised public key encryption is most suitable for wireless environment since it allows client to send URL of its certificate for energy-efficiency  ... 
doi:10.1007/978-3-540-39762-5_42 fatcat:bnuwlsd6xzfmhcf5z5s5ig2inu

Wireless Public Key Infrastructure for Mobile Phones

Balachandra Muniyal
2012 International journal of network security and its applications  
In this paper, a discussion of public key infrastructure and an experimental set up for Wireless Public key Infrastructure for mobile phones are made.  ...  This arises a need for the development of a Wireless Public Key Infrastructure (WPKI) that provides the similar security level as the wired PKI suitable for mobile phone.  ...  Following paragraphs discuss how wireless public key infrastructure can be deployed for mobile phones.  ... 
doi:10.5121/ijnsa.2012.4608 fatcat:v5ikpbwejbbzhi5cguh7gn3loy

User authentication scheme based on self-certified public-key for next generation wireless network

Dake He, Jianbo Wang, Yu Zheng
2008 2008 International Symposium on Biometrics and Security Technologies  
Consequently, it is more appropriate for 4G wireless system. Index Terms -Security of Wireless network, Authentication, Self-certified public-key, 4G wireless network.  ...  In this paper, a AKA scheme (SPAKA) based on self-certified public-key is proposed for the coming 4G system to reduce the storage, computation and communicational load of existing public-key based user  ...  PUBLIC-KEY BROADCAST PROTOCOL (PKBP) Recently, the public key infrastructure (PKI) has been gradually introducing in wireless network to provide enhanced scalability and advanced security for mobile user  ... 
doi:10.1109/isbast.2008.4547638 fatcat:jg7mp2gugncv3po667x2ai4w7y

A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications

Jiang Jun, He Chen
2005 Journal of Zhejiang University: Science A  
key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.  ...  for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public  ...  MD5 or SHA) to construct our new mutual authentication and session key agreement protocol appropriate for wireless communications.  ... 
doi:10.1631/jzus.2005.a0399 fatcat:ckhwg4o76jahxd7y4iuuywjhzu

Secure and efficient key management protocol (SEKMP) for wireless sensor networks

Majid Alshammari, Khaled Elleithy
2014 Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems - ANCS '14  
As a result, the sensors are left unattended and become a potential target for an adversary. Therefore, we propose a highly Secure and Efficient Key Management Protocol for WSN, called SEKMP.  ...  The proposed protocol (SEKMP) adapts a new key management approach by leveraging the advantages of asymmetric cryptography and employs them in a very efficient way for delivering the session key to sensor  ...  PU S Public key used in the sink node. PR N Private key used in each node. K S Session key used to encrypt the communication. C Ciphertext. M Plaintext.  ... 
doi:10.1145/2658260.2661775 dblp:conf/ancs/AlshammariE14 fatcat:eurbkpriuvf6va7wp7y26x4u3i

Novel Protocol and Its Implementation QKD in Wi-Fi Networks

Xu Huang, Shirantha Wijesekera, Dharmendra Sharma
2009 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science  
In this paper, we have extended our previous research work to a new protocol with the method of integrating quantum cryptography for key distribution in 802.11 wireless networks.  ...  However, providing secure communication for wireless networks has become one of the prime concerns.  ...  Quantum cryptography has the potential to offer this much needed secured data communications for 802.11 wireless networks.  ... 
doi:10.1109/icis.2009.122 dblp:conf/ACISicis/HuangWS09 fatcat:rvvl7j3bn5feleca7ojnm7zwxe

A Signcryption based Light Weight Key Exchange Protocol

Yong Feng, Qian Wei, Xing Zhang
2012 Physics Procedia  
for flexible dynamic deployment, i.e., wireless mesh networks, wireless sensor networks, mobile ad hoc networks, etc., in computational cost and communicational overhead and traditional digital signature  ...  Traditional cryptography based authenticated Diffie-Hellman key exchange protocols expose the problems of efficiency and privacy since signature-then-encryption is heavy to wireless communication special  ...  Secure and light weight key exchange protocols are highly pursued features in wireless communication special for flexible dynamic deployment, i.e., wireless mesh networks, wireless sensor networks, mobile  ... 
doi:10.1016/j.phpro.2012.03.147 fatcat:zxhztu6t3bg5xezjwom3irytjq

A Survey on Secure Routing Protocols in Wireless Sensor Networks

Yasir Arfat, Riaz Ahmed Shaikh
2016 International Journal of Wireless and Microwave Technologies  
Secondly, we have provided a taxonomy of secure routing protocols of WSNs. Thirdly, we have provided a qualitative comparison of existing secure routing protocols.  ...  Wireless Sensor Networks (WSNs) are typically formed by the collaboration of the large amount of partial sensor nodes, which are connected through a wireless medium.  ...  Conclusions Wireless sensor network comprises of resource constraint sensor nodes. That is why, designing and selecting an appropriate secure routing protocol for the network is a tough task.  ... 
doi:10.5815/ijwmt.2016.03.02 fatcat:vglqvqmmzfhnla5dvtjl6qcz2i

Facing the challenge of wireless security

S.K. Miller
2001 Computer  
With this in mind, the WPKI (wireless PKI) protocol offers a slimmed-down version of PKI optimized for wireless communications.  ...  Senders of digital certificates keep their private key secure but make the public key available to people with whom they communicate.  ... 
doi:10.1109/2.933495 fatcat:fh7ggzklxrgcnhtv4jhfyc522i

Security and resilience for smart devices and applications

Damien Sauveron, Konstantinos Markantonakis, Christos Verikoukis
2014 EURASIP Journal on Wireless Communications and Networking  
There are many open questions for these challenging issues such as security of protocols and applications, secure architecture, frameworks and methodologies for next generation wireless networks and respective  ...  Recent advances in development of wireless communication technologies and embedded computing systems led us into the area of the next generation wireless networks and smart devices.  ...  However, special thanks go to Professor Luc Vandendorpe, Editor-in-Chief, for approving and making this issue possible and to the staff of EURASIP Journal on Wireless Communications and Networks for their  ... 
doi:10.1186/1687-1499-2014-123 fatcat:ljmyjdcaezf7ngavdybaz3ftbm

Quantum Cryptography for Wireless Network Communications

Xu Huang, Shirantha Wijesekera, Dharmendra Sharma
2009 2009 4th International Symposium on Wireless Pervasive Computing  
However, providing secure communication for wireless networks has become one of the prime concerns.  ...  ⎯ It is well known that wireless networks have become one of the most important part used communication systems, in particular for ubiquitous computing.  ...  Quantum cryptography has the potential to offer this much needed secured data communications for 802.11 wireless networks.  ... 
doi:10.1109/iswpc.2009.4800604 fatcat:zgdvrgsisra6jfcv7ay5szzzge

Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum Cryptography

Xu Huang, Shirantha Wijesekera, Dharmendra Sharma
2010 2010 Fourth International Conference on Network and System Security  
Therefore, providing secure communication for wireless networks has become one of the prime concerns.  ...  Our contributions in this paper are as follows: (1) We discussed how QKD can be used in IEEE 802.11 wireless networks to securely distribute the keys. (2) We use new protocol QKD. (3) We introduced a method  ...  Once the photon transmission is over, the rest of the communication takes place in public channel (eg: internet, wireless medium).  ... 
doi:10.1109/nss.2010.17 dblp:conf/nss/HuangWS10 fatcat:ieerxiblq5b2rkuy66cublyhni

Implementation of QKD in 802.11 Networks

Xu Huang, Shirantha Wijesekera, Dharmendra Sharma
2009 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing  
However, providing secure communication for wireless networks has become one of the prime concerns.  ...  In this paper, we shall extend our previous research work to a new method of integrating quantum cryptography for key distribution in 802.11 wireless networks.  ...  Quantum cryptography has the potential to offer this much needed secured data communications for 802.11 wireless networks.  ... 
doi:10.1109/nswctc.2009.48 fatcat:iihp3lcg3ba3tkudp3oe7ukm5u
« Previous Showing results 1 — 15 out of 64,804 results