Wireless Sensor Networks(WSN)are commonly used to observe and monitor precise environments.WSNs consist of a large number of inexpensive sensor nodes that have been separated and distributed in different environments....Wireless Sensor Networks(WSN)are commonly used to observe and monitor precise environments.WSNs consist of a large number of inexpensive sensor nodes that have been separated and distributed in different environments.The base station received the amount of data collected by the numerous sensors.The current developments designate that the attentFgion in applications of WSNs has been increased and extended to a very large scale.The Trust-Based Adaptive Acknowledgement(TRAACK)Intrusion-Detection System for Wireless Sensor Networks(WSN)is described based on the number of active positive deliveries and The Kalman filter used in Modified Particle Swarm Optimization(MPSO)has been proposed to predict knot confidence.Simulations were run for non-malicious networks(0%malicious)and different percentages of malicious nodes were discussed.The findings suggest that the proposed method TRAACK Modified Particle Swarm Optimization(MPSO)packet delivery rate outperforms TRAACKPSO by 3.3%with 0%malicious nodes.Similarly,the packet delivery rate of TRAACKMPSO is 30%malicious,3.5%better than TRAACKPSO in WSN.展开更多
Authentication is important to the security of user data in a mobilecloud environment. Because of the server’s user credentials, it is subject toattacks. To maintain data authentication, a novel authentication mechan...Authentication is important to the security of user data in a mobilecloud environment. Because of the server’s user credentials, it is subject toattacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC)by producing a secret number that isn’t stored in the phone, which protects againstprivileged insider attacks. The user and server generate a nonce for dynamic useridentity and agree on a session secret key for safe communication. The passwordsare not stored on the computer or provided in plain text, they are resistant toreplay, guessing, and stolen verification attacks. The suggested protocol uses aone-way hash function and XOR operations, with the client having remote accessto a large number of servers over a secure communication channel. Concentrateson HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hashwould make it substantially more difficult to break via a rainbow table.展开更多
文摘Wireless Sensor Networks(WSN)are commonly used to observe and monitor precise environments.WSNs consist of a large number of inexpensive sensor nodes that have been separated and distributed in different environments.The base station received the amount of data collected by the numerous sensors.The current developments designate that the attentFgion in applications of WSNs has been increased and extended to a very large scale.The Trust-Based Adaptive Acknowledgement(TRAACK)Intrusion-Detection System for Wireless Sensor Networks(WSN)is described based on the number of active positive deliveries and The Kalman filter used in Modified Particle Swarm Optimization(MPSO)has been proposed to predict knot confidence.Simulations were run for non-malicious networks(0%malicious)and different percentages of malicious nodes were discussed.The findings suggest that the proposed method TRAACK Modified Particle Swarm Optimization(MPSO)packet delivery rate outperforms TRAACKPSO by 3.3%with 0%malicious nodes.Similarly,the packet delivery rate of TRAACKMPSO is 30%malicious,3.5%better than TRAACKPSO in WSN.
文摘Authentication is important to the security of user data in a mobilecloud environment. Because of the server’s user credentials, it is subject toattacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC)by producing a secret number that isn’t stored in the phone, which protects againstprivileged insider attacks. The user and server generate a nonce for dynamic useridentity and agree on a session secret key for safe communication. The passwordsare not stored on the computer or provided in plain text, they are resistant toreplay, guessing, and stolen verification attacks. The suggested protocol uses aone-way hash function and XOR operations, with the client having remote accessto a large number of servers over a secure communication channel. Concentrateson HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hashwould make it substantially more difficult to break via a rainbow table.