با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Privacy-preserving aware data transmission for IoT-based e-health
حفظ و انتقال داده های آگاهانه برای سلامت الکترونیکی مبتنی بر اینترنت اشیا-2019 Internet of Things (IoT) is an emerging networking paradigm that aims to improve human daily life. It includes a huge number of interactive nodes that generate, aggregate and exchange sensitive data. Thus, security and privacy challenges must be addressed. Various studies on privacy in the area of IoT were proposed. However, none has considered all privacy requirements. To meet such requirements, we pro- pose a novel privacy-preserving IoT-based e-health solution. This solution satisfies content and contex- tual privacy requirements. It is based on a specific communication scenario and a novel identity-based encryption scheme, respecting the limited resource nature of smart-things. To validate our proposal, an extensive security analysis is provided. Its effectiveness is also demonstrated through a performance eval- uation. Keywords: Internet of things | Privacy-preserving | Identity-Based cryptography | E-Health | BAN-Logic | AVISPA |
مقاله انگلیسی |
2 |
Security analysis of fast inter-LMA domain handover scheme in proxy mobile IPv6 networks
تجزیه و تحلیل امنیتی طرح سریع handover دامنه بین LMA در شبکه های IPv6 پروکسی تلفن همراه-2017 Article history:Received 8 October 2014Received in revised form 16 May 2016 Accepted 26 August 2016Available online 19 September 2016Keywords: FPMIPv6 CGABAN-logic Security analysis ESS-FHThe PMIPv6 is vulnerable to various security threats such as the DoS or redirect attacks. In this paper, we analyzed the Kang–Park & ESS-FH scheme, and proposed an Enhanced Security scheme for FPMIPv6 (ESS-FP). Based on the CGA method and the public key Cryptography, ESS-FP provides a strong key exchange and key independence in addition to improving the weaknesses of FPMIPv6. The proposed scheme was formally verified based on Ban-logic, and its handover latency was analyzed and compared with that of the Kang–Park scheme & ESS-FH. In addition, we proposed an inter-domain fast handover scheme for PMIPv6 using the proxy-based FPMIPv6.© 2016 Elsevier B.V. All rights reserved. Keywords:FPMIPv6 | CGA | BAN-logic | Security analysis | ESS-FH |
مقاله انگلیسی |
3 |
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
احراز هویت کاربر کارا و طرح توافق کلیدی برای شبکه حسگر بیسیم ناهمگن برای محیط اینترنت اشیا-2016 The concept of Internet of Things (IOT), which is already at our front doors, is that every object
in the Internet infrastructure (II) is interconnected into a global dynamic expanding network.
Sensors and smart objects are beside classical computing devices key parties of the IOT. We
can already exploit the benefits of the IOT by using various weareables or smart phones which
are full of diverse sensors and actuators and are connected to the II via GPRS or Wi-Fi. Since
sensors are a key part of IOT, thus are wireless sensor networks (WSN). Researchers are already
working on new techniques and efficient approaches on how to integrate WSN better into the
IOT environment. One aspect of it is the security aspect of the integration. Recently, Turkanovic ´
et al.’s proposed a highly efficient and novel user authentication and key agreement scheme
(UAKAS) for heterogeneous WSN (HWSN) which was adapted to the IOT notion. Their scheme
presented a novel approach where a user from the IOT can authenticate with a specific sen
sor node from the HWSN without having to communicate with a gateway node. Moreover
their scheme is highly efficient since it is based on a simple symmetric cryptosystem. Unfor
tunately we have found that Turkanovic et al.’s scheme has some security shortcomings and ´
is susceptible to some cryptographic attacks. This paper focuses on overcoming the security
weaknesses of Turkanovic et al.’s scheme, by proposing a new and improved UAKAS. The pro- ´
posed scheme enables the same functionality but improves the security level and enables the
HWSN to dynamically grow without influencing any party involved in the UAKAS. The results
of security analysis by BAN-logic and AVISPA tools confirm the security properties of the pro
posed scheme.
Keywords: Internet of Things | Wireless sensor networks | Key agreement | Authentication | BAN-logic | AVISPA tools |
مقاله انگلیسی |
4 |
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
تأیید هویت کاربر کارآمد و طرح توافق کلیدی برای شبکه های حسگر بی سیم ناهمگن مناسب برای اینترنت اشیاء محیطی-2015 The concept of Internet of Things (IOT), which is already at our front doors, is that every object in the Internet
infrastructure (II) is interconnected into a global dynamic expanding network. Sensors and smart objects are beside
classical computing devices key parties of the IOT. We can already exploit the benets of the IOT by using various
weareables or smart phones which are full of diverse sensors and actuators and are connected to the II via GPRS or
Wi-Fi. Since sensors are a key part of IOT, thus are wireless sensor networks (WSN). Researchers are already working
on new techniques and efcient approaches on how to integrate WSN better into the IOT environment. One aspect
of it is the security aspect of the integration. Recently, Turkanovic et al.'s proposed a highly efcient and novel user ´
authentication and key agreement scheme (UAKAS) for heterogeneous WSN (HWSN) which was adapted to the IOT
notion. Their scheme presented a novel approach where a user from the IOT can authenticate with a specic sensor
node from the HWSN without having to communicate with a gateway node. Moreover their scheme is highly efcient
since it based on a simple symmetric cryptosystem. Unfortunately we have found that Turkanovic et al.'s scheme has ´
some security shortcomings and is susceptible to some cryptographic attacks. This paper focuses on overcoming the
security weaknesses of Turkanovic et al.'s by proposing a new and improved UAKAS. The proposed scheme enables ´
the same functionality but improves the security level and enables the HWSN to dynamically grow without inuencing
any party involved in the UAKAS. The results of security analysis by BAN-logic and AVISPA tools conrm the security
properties of the proposed scheme.
Keywords: Internet of Things | Wireless Sensor Networks | Key agreement | Authentication | BAN-logic | AVISPA tools |
مقاله انگلیسی |