Access the full text.
Sign up today, get unlimited access with DeepDyve Pro!
to, and detect discrepancies between the GNSS- provided time and the network time. The challenge lies in having reliably both accurate and trustworthy network time as the basis for the GNSS attack detection. Here ...
’ problem and also leads to the consumption of more energy in the network. In data dissemination, providing energy efficiency and security are the two major challenging issues. In such a scenario ...
scheme for WBANs considering available resources of a node during the whole life cycle of key management. The scheme was a cluster-based hybrid security framework that supports both intra-WBAN and inter ...
a continuously increasing list of ordered records, is trusted for correctness and availability because all data recorded in the blockchain is publicly validated. In this paper, we introduce a secure and reliable ...
scheme’s design and provide an illustrative scenario of its application. 5.1 Multi-receiver Identity-Based Signcryption(mIBSC) 5.1.1 Setup(λ, N) → (params, MSK). The scheme’s security parameter is λ ...
Abstract In recent years, many schemes have been proposed to disseminate Emergency Warning Messages (EWMs) in VANETs. However, various problems such as broadcast storm, hidden terminal ...
can satisfy some of the security requirements, namely reliability (the announcement was issued by a legitimate source without unauthorized modification); privacy (a broadcast message cannot be bound ...
Abstract In this paper, Cluster-Based Secure Communication and Certificate Revocation Scheme for VANET is proposed. Initially, the nodes (vehicles) are gathered into various clusters and cluster head ...
. RUy needs to communicate with SNx to securely procure the real-time information collected by SNx. Therefore, an AKE scheme is imperative for secure and reliable communications between RUy and SNx ...
to safety and security issues. Therefore, military communication networks (MCNs) demand communications safety and reliability to ensure the success of broadcasting their sensitive data. In MCNs, the right ...
Access the full text.
Sign up today, get unlimited access with DeepDyve Pro!