| 查看: 678 | 回复: 3 | |||||
| 本帖产生 1 个 翻译EPI ,点击这里进行查看 | |||||
| 当前只显示满足指定条件的回帖,点击这里查看本话题的所有回帖 | |||||
liushaojiang银虫 (小有名气)
|
[求助]
求助翻译一段摘要,翻译完送100金币!
|
||||
急求好人翻译一段摘要,自己英文水平不过关啊 ,不要用软件翻译,翻译完即送100金币,![]() 要翻译的摘要:为了强化合法用户通过身份验证获取传感器网络节点数据时的安全性能,基于已有的A协议和B协议的研究基础,提出一种混合C协议的无线传感器网络身份验证协议(D)。该协议具有A协议通过单向散列函数和异或运算来实现加密/解密的性能,并具有B协议采用唯一的智能卡进行身份验证的特点,相比这两个协议,D协议增加了密码变更阶段,并且在协议的验证阶段增加了登录节点与传感器节点之间的互相验证操作,加强了身份验证的安全性。通过进行协议的安全特性对比和计算成本分析,表明D协议相比A协议和B协议,可以抵御伪装网关重放攻击,伪装登陆节点攻击以及蛮力攻击,并具有更好的安全性能。 |
» 猜你喜欢
存款400万可以在学校里躺平吗
已经有26人回复
拟解决的关键科学问题还要不要写
已经有8人回复
最失望的一年
已经有7人回复
推荐一本书
已经有16人回复
国自然申请面上模板最新2026版出了吗?
已经有20人回复
26申博
已经有3人回复
请教限项目规定
已经有3人回复
基金委咋了?2026年的指南还没有出来?
已经有10人回复
基金申报
已经有6人回复
疑惑?
已经有5人回复
feixiaolin
荣誉版主 (文坛精英)
-

专家经验: +518 - 翻译EPI: 28
- 应助: 942 (博后)
- 贵宾: 1.275
- 金币: 3430
- 散金: 58785
- 红花: 532
- 沙发: 11
- 帖子: 24215
- 在线: 2601.8小时
- 虫号: 2139575
- 注册: 2012-11-21
- 专业: 光学信息获取与处理
- 管辖: 数学
| For strengthening the safety performance of legitimate users access network node data through authentication, , it was proposed that a wireless sensor network authentication protocol (D) which combining protocol (C) based on analysis of existing protocols A and B. Our protocol agreement has the performance of one-way hash function and XOR to implement encryption /decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. By comparing characteristics of security features and the calculating cost, it showed that D agreements has better safety performance than either A or B in camouflage gateway replay attack, camouflage landing node attack and brute force attack. |
4楼2014-01-18 16:19:56
feixiaolin
荣誉版主 (文坛精英)
-

专家经验: +518 - 翻译EPI: 28
- 应助: 942 (博后)
- 贵宾: 1.275
- 金币: 3430
- 散金: 58785
- 红花: 532
- 沙发: 11
- 帖子: 24215
- 在线: 2601.8小时
- 虫号: 2139575
- 注册: 2012-11-21
- 专业: 光学信息获取与处理
- 管辖: 数学
【答案】应助回帖
★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ★ ...
liushaojiang: 金币+100, 翻译EPI+1, ★★★★★最佳答案, 非常感谢 2014-01-18 19:30:24
liushaojiang: 金币+100, 翻译EPI+1, ★★★★★最佳答案, 非常感谢 2014-01-18 19:30:24
| Our protocol agreement has the performance of one-way hash function and XOR to implement encryption /decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. By comparing characteristics of security features and the calculating cost, it showed that D agreements has better safety performance than either A or B in camouflage gateway replay attack, camouflage landing node attack and brute force attack. |
2楼2014-01-18 15:25:02
feixiaolin
荣誉版主 (文坛精英)
-

专家经验: +518 - 翻译EPI: 28
- 应助: 942 (博后)
- 贵宾: 1.275
- 金币: 3430
- 散金: 58785
- 红花: 532
- 沙发: 11
- 帖子: 24215
- 在线: 2601.8小时
- 虫号: 2139575
- 注册: 2012-11-21
- 专业: 光学信息获取与处理
- 管辖: 数学
【答案】应助回帖
|
// 刚才落下了第一部分,现补全。 For strengthening the safety performance of legitimate users access network node data through authentication, , it was proposed that a wireless sensor network authentication protocol (D) which combining protocol (C) based on analysis of existing protocols A and B. Our protocol agreement has the performance of one-way hash function and XOR to implement encryption / decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. Our protocol agreement has the performance of one-way hash function and XOR to implement encryption /decryption as A, and using a smart card for authentication features as B, besides that, D agreement increases the password change phase and the verification phase protocol increases the mutual authentication between the node and the sensor node login operation to enhance the security of the authentication. By comparing characteristics of security features and the calculating cost, it showed that D agreements has better safety performance than either A or B in camouflage gateway replay attack, camouflage landing node attack and brute force attack. |
3楼2014-01-18 15:33:34













,不要用软件翻译,翻译完即送100金币,
回复此楼