| ²é¿´: 706 | »Ø¸´: 3 | |||||
| ±¾Ìû²úÉú 1 ¸ö ·ÒëEPI £¬µã»÷ÕâÀï½øÐв鿴 | |||||
| µ±Ç°Ö»ÏÔʾÂú×ãÖ¸¶¨Ìõ¼þµÄ»ØÌû£¬µã»÷ÕâÀï²é¿´±¾»°ÌâµÄËùÓлØÌû | |||||
liushaojiangÒø³æ (СÓÐÃûÆø)
|
[ÇóÖú]
ÇóÖú·ÒëÒ»¶ÎÕªÒª£¬·ÒëÍêËÍ100½ð±Ò£¡
|
||||
¼±ÇóºÃÈË·ÒëÒ»¶ÎÕªÒª£¬×Ô¼ºÓ¢ÎÄˮƽ²»¹ý¹Ø°¡ £¬²»ÒªÓÃÈí¼þ·Ò룬·ÒëÍê¼´ËÍ100½ð±Ò£¬![]() Òª·ÒëµÄÕªÒª£ºÎªÁËÇ¿»¯ºÏ·¨Óû§Í¨¹ýÉí·ÝÑéÖ¤»ñÈ¡´«¸ÐÆ÷ÍøÂç½ÚµãÊý¾ÝʱµÄ°²È«ÐÔÄÜ£¬»ùÓÚÒÑÓеÄAÐÒéºÍBÐÒéµÄÑо¿»ù´¡£¬Ìá³öÒ»ÖÖ»ìºÏCÐÒéµÄÎÞÏß´«¸ÐÆ÷ÍøÂçÉí·ÝÑéÖ¤ÐÒé(D)¡£¸ÃÐÒé¾ßÓÐAÐÒéͨ¹ýµ¥ÏòÉ¢Áк¯ÊýºÍÒì»òÔËËãÀ´ÊµÏÖ¼ÓÃÜ/½âÃܵÄÐÔÄÜ£¬²¢¾ßÓÐBÐÒé²ÉÓÃΨһµÄÖÇÄÜ¿¨½øÐÐÉí·ÝÑéÖ¤µÄÌØµã£¬Ïà±ÈÕâÁ½¸öÐÒ飬DÐÒéÔö¼ÓÁËÃÜÂë±ä¸ü½×¶Î£¬²¢ÇÒÔÚÐÒéµÄÑéÖ¤½×¶ÎÔö¼ÓÁ˵Ǽ½ÚµãÓë´«¸ÐÆ÷½ÚµãÖ®¼äµÄ»¥ÏàÑéÖ¤²Ù×÷£¬¼ÓÇ¿ÁËÉí·ÝÑéÖ¤µÄ°²È«ÐÔ¡£Í¨¹ý½øÐÐÐÒéµÄ°²È«ÌØÐԶԱȺͼÆËã³É±¾·ÖÎö£¬±íÃ÷DÐÒéÏà±ÈAÐÒéºÍBÐÒ飬¿ÉÒÔµÖÓùÎ±×°Íø¹ØÖطŹ¥»÷£¬Î±×°µÇ½½Úµã¹¥»÷ÒÔ¼°ÂùÁ¦¹¥»÷£¬²¢¾ßÓиüºÃµÄ°²È«ÐÔÄÜ¡£ |
» ²ÂÄãϲ»¶
285Çóµ÷¼Á
ÒѾÓÐ12È˻ظ´
Çóµ÷¼Á
ÒѾÓÐ6È˻ظ´
085600²ÄÁÏÓ뻯¹¤301·ÖÇóµ÷¼ÁԺУ
ÒѾÓÐ19È˻ظ´
277¹¤¿ÆÇóµ÷¼Á
ÒѾÓÐ11È˻ظ´
277Çóµ÷¼Á ÊýÒ»104·Ö
ÒѾÓÐ13È˻ظ´
304Çóµ÷¼Á
ÒѾÓÐ10È˻ظ´
336Çóµ÷¼Á£¬Ò»Ö¾Ô¸Öпƴó
ÒѾÓÐ6È˻ظ´
071000ÉúÎïѧ£¬Ò»Ö¾Ô¸ÉîÛÚ´óѧ296·Ö£¬Çóµ÷¼Á
ÒѾÓÐ3È˻ظ´
Ò»Ö¾Ô¸±±¾©»¯¹¤085600 310·ÖÇóµ÷¼Á
ÒѾÓÐ19È˻ظ´
274Çóµ÷¼ÁÇóµ÷¼Á
ÒѾÓÐ7È˻ظ´
feixiaolin
ÈÙÓþ°æÖ÷ (ÎÄ̳¾«Ó¢)
-

ר¼Ò¾Ñé: +518 - ·ÒëEPI: 28
- Ó¦Öú: 942 (²©ºó)
- ¹ó±ö: 1.275
- ½ð±Ò: 3880
- É¢½ð: 58785
- ºì»¨: 532
- ɳ·¢: 11
- Ìû×Ó: 24215
- ÔÚÏß: 2601.8Сʱ
- ³æºÅ: 2139575
- ×¢²á: 2012-11-21
- רҵ: ¹âѧÐÅÏ¢»ñÈ¡Óë´¦Àí
- ¹ÜϽ: Êýѧ
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
|
// ¸Õ²ÅÂäÏÂÁ˵ÚÒ»²¿·Ö£¬ÏÖ²¹È«¡£ For strengthening the safety performance of legitimate users access network node data through authentication, , it was proposed that a wireless sensor network authentication protocol (D) which combining protocol (C) based on analysis of existing protocols A and B. Our protocol agreement has the performance of one-way hash function and XOR to implement encryption / decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. Our protocol agreement has the performance of one-way hash function and XOR to implement encryption /decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. By comparing characteristics of security features and the calculating cost, it showed that D agreements has better safety performance than either A or B in camouflage gateway replay attack, camouflage landing node attack and brute force attack. |
3Â¥2014-01-18 15:33:34
feixiaolin
ÈÙÓþ°æÖ÷ (ÎÄ̳¾«Ó¢)
-

ר¼Ò¾Ñé: +518 - ·ÒëEPI: 28
- Ó¦Öú: 942 (²©ºó)
- ¹ó±ö: 1.275
- ½ð±Ò: 3880
- É¢½ð: 58785
- ºì»¨: 532
- ɳ·¢: 11
- Ìû×Ó: 24215
- ÔÚÏß: 2601.8Сʱ
- ³æºÅ: 2139575
- ×¢²á: 2012-11-21
- רҵ: ¹âѧÐÅÏ¢»ñÈ¡Óë´¦Àí
- ¹ÜϽ: Êýѧ
¡¾´ð°¸¡¿Ó¦Öú»ØÌû
¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ...
liushaojiang: ½ð±Ò+100, ·ÒëEPI+1, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸, ·Ç³£¸Ðл 2014-01-18 19:30:24
liushaojiang: ½ð±Ò+100, ·ÒëEPI+1, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸, ·Ç³£¸Ðл 2014-01-18 19:30:24
| Our protocol agreement has the performance of one-way hash function and XOR to implement encryption /decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. By comparing characteristics of security features and the calculating cost, it showed that D agreements has better safety performance than either A or B in camouflage gateway replay attack, camouflage landing node attack and brute force attack. |
2Â¥2014-01-18 15:25:02
feixiaolin
ÈÙÓþ°æÖ÷ (ÎÄ̳¾«Ó¢)
-

ר¼Ò¾Ñé: +518 - ·ÒëEPI: 28
- Ó¦Öú: 942 (²©ºó)
- ¹ó±ö: 1.275
- ½ð±Ò: 3880
- É¢½ð: 58785
- ºì»¨: 532
- ɳ·¢: 11
- Ìû×Ó: 24215
- ÔÚÏß: 2601.8Сʱ
- ³æºÅ: 2139575
- ×¢²á: 2012-11-21
- רҵ: ¹âѧÐÅÏ¢»ñÈ¡Óë´¦Àí
- ¹ÜϽ: Êýѧ
| For strengthening the safety performance of legitimate users access network node data through authentication, , it was proposed that a wireless sensor network authentication protocol (D) which combining protocol (C) based on analysis of existing protocols A and B. Our protocol agreement has the performance of one-way hash function and XOR to implement encryption /decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. By comparing characteristics of security features and the calculating cost, it showed that D agreements has better safety performance than either A or B in camouflage gateway replay attack, camouflage landing node attack and brute force attack. |
4Â¥2014-01-18 16:19:56














£¬²»ÒªÓÃÈí¼þ·Ò룬·ÒëÍê¼´ËÍ100½ð±Ò£¬
»Ø¸´´ËÂ¥