Tayyab Khan

Tayyab Khan

مطالب

فیلتر های جستجو: فیلتری انتخاب نشده است.
نمایش ۱ تا ۲ مورد از کل ۲ مورد.
۱.

Enhanced Lightweight and Secure Session Key Establishment Protocol for Smart Hospital Inhabitants(مقاله علمی وزارت علوم)

کلید واژه ها: Session Key Cryptanalysis Smart Hospital Environment WSN (Wireless Sensor Network) BAN (Body Area Network)

حوزه های تخصصی:
تعداد بازدید : 237 تعداد دانلود : 824
In the era of internet technologies, to provide wireless communication and transfer the information in seconds from one place to another has arrived because of the need to consume information technologies. All users desire to quickly access the smart world’s life and interact with the entire world socially. This paper proposed an environment for the safe and secure smart patient’s room connected to the WSN, BAN, and RFID. All the data will be transferred to the session key, secure and contains the patient’s information. The network connected through WSN and data will be sent through the session key to make an smart hospital’s patient cabin. The small token is there that will be transferred throughout the network to get authenticated by each network. This proposed scheme is secure enough to overcome the drawbacks of the other protocol in such a way as to make the protocol more secure from the entire adversary’s attack may occur.
۲.

Multi Trust-based Secure Trust Model for WSNs(مقاله علمی وزارت علوم)

کلید واژه ها: Trust management Resource scheduling Attacks WSN

حوزه های تخصصی:
تعداد بازدید : 758 تعداد دانلود : 332
Trust establishment (TE) among sensor nodes has become a vital requirement to improve security, reliability, and successful cooperation. Existing trust management approaches for large scale WSN are failed due to their low cooperation (i.e., dependability), higher communication and memory overheads (i.e., resource inefficient). This paper provides a new and comprehensive hybrid trust estimation approach for large scale WSN employing clustering to improve cooperation, trustworthiness, and security by detecting selfish sensor nodes with reduced resource (memory, power) consumption. The proposed scheme consists of unique features like authentication based data trust, scheduler based node trust, and attack resistant by giving the high penalty and minimum reward during node misbehavior. A task scheduling mechanism is employed for scheduling the significant task to reduce computation overhead. The proposed trust model would be capable to provide security against blackhole attack, grey hole attack, and badmouthing attack. Moreover, the proposed trust model feasibility has been tested with MATLAB. Simulation results exhibit the great performance of our proposed approach in terms of trust evaluation cost, prevention, and detection of malicious nodes with the help of analyzing consistency in trust values and communication overhead.

کلیدواژه‌های مرتبط

پدیدآورندگان همکار

تبلیغات

پالایش نتایج جستجو

تعداد نتایج در یک صفحه:

درجه علمی

مجله

سال

حوزه تخصصی

زبان