|
|
【答案】应助回帖
★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ liushaojiang: 金币+50, 翻译EPI+1, ★★★★★最佳答案, 非常感谢! 2013-10-14 15:06:04
When obtaining node data through user identification in wireless sensor networks, it happens that passwords are cracked and there are also other security problems e.g. being prone to network attacks. Focused on this and based on the improved identity verification mechanism, ** protocol is proposed after introducing a verification mechanism between A and B as well as between B and C, and a mechanism for user password change. This protocol has security features that prevent gateway node sideway attacks, masked attacks and other network attacks and its provided capability of password change protection can prevent security problems when passwords are leaked out. Experimental results show Protocol A offers much higher security than other improved B protocols.
供参考 |
|