Downloads: 107 | Views: 115
Research Paper | Computer Science & Engineering | United Kingdom | Volume 3 Issue 7, July 2014
Cryptanalysis of Identity Transmission Authentication System
Abstract: Recently, Shm et al. introduced the efficient identity-typed transmission authentication scheme relied on some system in order to reach security properties in wireless sensor networks. They claim that their system can attain security properties and alleviated denial-of-service attack by preventive the times of signature verification nonsuccess in wireless sensor networks. But, we discovered that a scheme does not achieve the security requirements as they claimed. We will show that in this paper.
Keywords: identity signature scheme, transmission authentication scheme, Wireless Sensor Networks, denial-of-service attack
Edition: Volume 3 Issue 7, July 2014,
Pages: 2387 - 2389
Similar Articles with Keyword 'Wireless Sensor Networks'
Downloads: 159 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri | S. K. Srivatsa [4]
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia