5,577 research outputs found

    A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge

    Full text link
    Establishment of pairwise keys between sensor nodes in a sensor network is a difficult problem due to resource limitations of sensor nodes as well as vulnerability to physical captures of sensor nodes by the enemy. Public-key cryptosystems are not much suited for most resource-constrained sensor networks. Recently, elliptic curve cryptographic techniques show that public key cryptosystem is also feasible for resource-constrained sensor networks. However, most researchers accept that the symmetric key cryptosystems are viable options for resource-constrained sensor networks. In this paper, we first develop a basic principle to address the key pre-distribution problem in mobile sensor networks. Then, using this developed basic principle, we propose a scheme which takes the advantage of the post-deployment knowledge. Our scheme is a modified version of the key prioritization technique proposed by Liu and Ning. Our improved scheme provides reasonable network connectivity and security. Moreover, the proposed scheme works for any deployment topology.Comment: Published in International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.4, July 201

    An Identity Based Key Management Scheme in Wireless Sensor Networks

    Full text link
    Pairwise key establishment is one of the fundamental security services in sensor networks which enables sensor nodes in a sensor network to communicate securely with each other using cryptographic techniques. It is not feasible to apply traditional public key management techniques in resource-constrained sensor nodes, and also because the sensor nodes are vulnerable to physical capture. In this paper, we introduce a new scheme called the identity based key pre-distribution using a pseudo random function (IBPRF), which has better trade-off between communication overhead, network connectivity and resilience against node capture compared to the other key pre-distribution schemes. Our scheme can be easily adapted in mobile sensor networks. This scheme supports the addition of new sensor nodes after the initial deployment and also works for any deployment topology. In addition, we propose an improved version of our scheme to support large sensor networks.Comment: 7 pages, Published in Proceedings of 4th Asian International Mobile Computing Conference (AMOC 2006), Kolkata, India, pp. 70-76, January 4-7, 200

    Bipartite powers of some classes of bipartite graphs

    Full text link
    Graph powers are a well-studied concept in graph theory. Analogous to graph powers, Chandran et al.[3] introduced the concept of bipartite powers for bipartite graphs. In this paper, we will demonstrate that some well-known classes of bipartite graphs, namely the interval bigraphs, proper interval bigraphs, and bigraphs of Ferrers dimension 2, are closed under the operation of taking bipartite powers. Finally, we define strongly closed property for bipartite graphs under powers and have shown that the class of chordal bipartite graphs is strongly closed under powers

    Phyto-pharmacological review of Portulaca quadrifida Linn.

    Get PDF
    Portulaca quadrifida Linn. (Family: Portuleacea), commonly known as “Chicken Weed”, a traditional medicinal plant has been used in the Ayurvedic system of medicine for centuries, valued for its benefits in the management of urinary and inflammatory disorders. The juice of leaves is applied to abscesses and decoction is given in dysentery. The decoction of the plant can act as anthelminthic and used in the treatment of stomach complaints and gonorrhoea. Portulaca quadrifida has been reported to possess antifungal activity. The effect of ethanolic extract of Portulaca quadrifida on central and peripheral nervous system were studied by using spontaneous motor activity, in vivo muscle relaxant activity (Grip strength) and anticonvulsant activity and it is also found to have good effect on central nervous system. In this review, we have explored the Phyto-pharmacological properties of the Portulaca quadrifida plant and compiled its vast pharmacological applications to comprehend and synthesize the subject of its potential image of multipurpose medicinal agents

    Obstruction characterization of co-TT graphs

    Full text link
    Threshold tolerance graphs and their complement graphs ( known as co-TT graphs) were introduced by Monma, Reed and Trotter[24]. Introducing the concept of negative interval Hell et al.[19] defined signed-interval bigraphs/digraphs and have shown that they are equivalent to several seemingly different classes of bigraphs/digraphs. They have also shown that co-TT graphs are equivalent to symmetric signed-interval digraphs. In this paper we characterize signed-interval bigraphs and signed-interval graphs respectively in terms of their biadjacency matrices and adjacency matrices. Finally, based on the geometric representation of signed-interval graphs we have setteled the open problem of forbidden induced subgraph characterization of co-TT graphs posed by Monma, Reed and Trotter in the same paper.Comment: arXiv admin note: substantial text overlap with arXiv:2206.0591

    Undeniable Authentication of Digital Twin-managed Smart Microfactory

    Get PDF
    Smart Microfactories Use Additive Manufacturing to Create Products with Mixed Materials and Variable Sizes. Digital Twin Technology Enhances Control of the Additive Manufacturing Equipment in These Factories, Increasing Productivity and Minimizing Errors. the Digital Twins Communicate with the Machines to Furnish Sensitive Data and Instructions, Which Must Be Protected from Tampering. Authentication Rescues the Digital and Physical Twins from Menacing Attacks Such as Privileged Insider, Impersonation, Ephemeral Secret Leakage (ESL) and Man-In-The-Middle (MiTM) Attacks. to This End, We Propose Lightweight Authentication among the Digital and Physical Twins with the Undeniability of Issued Commands and Deniable Key Agreement. It Achieves Perfect Forward Secrecy, Unforgeability and Anonymity. Rigorous Formal Verification with AVISPA and Informal Security Analysis Show the Robustness of This Protocol to the Aforesaid Attacks

    Jahn-Tellerovi efekti u bakarnom fluor-silicij heksahidratu s 10% cinka: EPR mjerenja u X-pojasu

    Get PDF
    Stable crystals of copper fluosilicate hexahydrate (CZFH) have been successfully grown. X-band (9 GHz) EPR spectral studies carried out at room and liquid nitrogen temperatures have revealed some new features of Jahn-Teller effect in CZFH.Uspješno smo pripremili stabilne kristale bakarnog fluor-silicij heksahidrata (CZFH). Načinili smo mjerenja EPR spektara u X-pojasu (9 GHz) na sobnoj temperaturi i temperaturi tekućeg dušika koja pokazuju neke nove odlike JahnTellerovog efekta u CZFH
    • …
    corecore