Initial works in ad hoc routing have considered only the problem of providing efficient mechanisms for finding paths in such networks,without considering security as a major problem.In such a trusted environment,malic...Initial works in ad hoc routing have considered only the problem of providing efficient mechanisms for finding paths in such networks,without considering security as a major problem.In such a trusted environment,malicious behaviors can disturb routing process.We present the design and performance evaluation of a new secure on-demand routing protocol for ad hoc networks, called CASR.CASR is robust against attackers from outside of the network and even it prevents compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes.Because of using symmetric cryptography in its structure,CASR is robust against large number of types of Denial-of -Service attacks.However,due to the applying of the random key predistributions method to the routing process our proposed scheme reaches a trade-off between the degree of security and complexity.展开更多
The recent surge in the number of machines,appliances,and services connected to the Internet demands secure processing and transmission of sensory data.Authentication plays a crucial role in a typical security model u...The recent surge in the number of machines,appliances,and services connected to the Internet demands secure processing and transmission of sensory data.Authentication plays a crucial role in a typical security model used in the Internet of Things(IoT),and it protects data communications from various attacks,such as impersonation and denial of service,by verifying and allowing legitimate users to access the IoT resources.However,recent authentication literature has not addressed the need for developing a scalable and efficient authentication method in this field.This paper proposes a secure and anonymous ticket-based authentication method for the IoT.The proposed method protects the network from various security and privacy threats such as data alternation and denial of service while also offering mutual authentication and sensor anonymity.Our security and performance evaluations confirm the improvement.展开更多
A comparison between intensity noise spectra and also the line shapes of gain-guided, weakly-index-guided, and strongly-index-guided semiconductor lasers are made using numerical solution of Maxwell-Bloch equations in...A comparison between intensity noise spectra and also the line shapes of gain-guided, weakly-index-guided, and strongly-index-guided semiconductor lasers are made using numerical solution of Maxwell-Bloch equations including spontaneous emission noise.展开更多
Several planar waveguides have been fabricated. The waveguides have been polished for determination of their refractive index profiles (RIP) by wedge method. The RIP determined by inserting the sample in a Mach-Zehnde...Several planar waveguides have been fabricated. The waveguides have been polished for determination of their refractive index profiles (RIP) by wedge method. The RIP determined by inserting the sample in a Mach-Zehnder interferometer and applying fringe analysis methods.展开更多
Intensity noise including Mode Partition Noise (MPN) and Mode Hopping Noise (MHN), and Phase/Frequency Noise Spectrum (FNS) are calculated for a two-mode semiconductor laser. RIN is derived considering of MPN and MHN ...Intensity noise including Mode Partition Noise (MPN) and Mode Hopping Noise (MHN), and Phase/Frequency Noise Spectrum (FNS) are calculated for a two-mode semiconductor laser. RIN is derived considering of MPN and MHN effect.展开更多
基金supported by Iran Telecommunication Research Center
文摘Initial works in ad hoc routing have considered only the problem of providing efficient mechanisms for finding paths in such networks,without considering security as a major problem.In such a trusted environment,malicious behaviors can disturb routing process.We present the design and performance evaluation of a new secure on-demand routing protocol for ad hoc networks, called CASR.CASR is robust against attackers from outside of the network and even it prevents compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes.Because of using symmetric cryptography in its structure,CASR is robust against large number of types of Denial-of -Service attacks.However,due to the applying of the random key predistributions method to the routing process our proposed scheme reaches a trade-off between the degree of security and complexity.
文摘The recent surge in the number of machines,appliances,and services connected to the Internet demands secure processing and transmission of sensory data.Authentication plays a crucial role in a typical security model used in the Internet of Things(IoT),and it protects data communications from various attacks,such as impersonation and denial of service,by verifying and allowing legitimate users to access the IoT resources.However,recent authentication literature has not addressed the need for developing a scalable and efficient authentication method in this field.This paper proposes a secure and anonymous ticket-based authentication method for the IoT.The proposed method protects the network from various security and privacy threats such as data alternation and denial of service while also offering mutual authentication and sensor anonymity.Our security and performance evaluations confirm the improvement.
文摘A comparison between intensity noise spectra and also the line shapes of gain-guided, weakly-index-guided, and strongly-index-guided semiconductor lasers are made using numerical solution of Maxwell-Bloch equations including spontaneous emission noise.
文摘Several planar waveguides have been fabricated. The waveguides have been polished for determination of their refractive index profiles (RIP) by wedge method. The RIP determined by inserting the sample in a Mach-Zehnder interferometer and applying fringe analysis methods.
文摘Intensity noise including Mode Partition Noise (MPN) and Mode Hopping Noise (MHN), and Phase/Frequency Noise Spectrum (FNS) are calculated for a two-mode semiconductor laser. RIN is derived considering of MPN and MHN effect.