Cryptanalysis of Identity Transmission Authentication System
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 7)Publication Date: 2014-07-05
Authors : Sattar J. Aboud;
Page : 2387-2389
Keywords : identity signature scheme; transmission authentication scheme; Wireless Sensor Networks; denial-of-service attack;
Abstract
Recently, Shm et al. introduced the efficient identity-typed transmission authentication scheme relied on some system in order to reach security properties in wireless sensor networks. They claim that their system can attain security properties and alleviated denial-of-service attack by preventive the times of signature verification nonsuccess in wireless sensor networks. But, we discovered that a scheme does not achieve the security requirements as they claimed. We will show that in this paper.
Other Latest Articles
- Effectiveness of Self Instructional Module on Knowledge of Primary School Teachers Regarding Learning Disorders Among Children in Selected Schools at Karad City
- Energy Efficient QRS Detection Method for Wearable Wireless ECG Body Sensors - A Review
- Analysis and Implementation of Peer to Peer Live Video Streaming System
- Influence of Periwinkle Shells Ash as Filler in Hot Mix Asphalt
- QMGenerator Framework and Knowledge Base for Software Quality Model-based
Last modified: 2021-06-30 21:02:23