WSN key recovery attack based on symmetric matrix decomposition
The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol w...
Saved in:
Main Authors: | Xiangmin JI, Bo ZHAO, Jinhui LIU, Jianwei JIA, Huanguo ZHANG, Shuang XIANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018221/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Study on shared key management scheme for WSN based on LEACH protocol
by: Min FAN, et al.
Published: (2016-08-01) -
Key distribution and recovery algorithm based on Shamir's secret sharing
by: Hui-gui RONG, et al.
Published: (2015-03-01) -
Comparison of Gaussian Elimination and Cholesky Decomposition Solving A Linear System Of Equation.
by: Nzabonimpa, Godfrey
Published: (2024) -
Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha
by: Nitin Kumar Sharma, et al.
Published: (2024-01-01) -
A Comparison of Gaussian Elimination and Cholesky Decomposition Methods in Solving a System of Linear Equations.
by: Niringiye, Richard
Published: (2024)