We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded v...
Yao-Chung Lin, David P. Varodayan, Torsten Fink, E...
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...