SlideShare a Scribd company logo
1 of 9
International Journal of Wireless & Mobile
Networks (IJWMN)
ISSN:0975-3834 [Online]; 0975-4679 [Print]
http://airccse.org/journal/ijwmn.html
Certificateless Scheme Based NTRU Cryptosystem for Ad-Hoc UWB-IR
Network
Jamel Miri, Innov'Com Laboratory, Tunisia
AIRCC Publishing Corporation
AIRCC Publishing Corporation
Abstract
From the radar and military research world’s, the Ultra-Wide Band Impulse Radio (UWB-
IR) was adopted in the telecommunications world in the 1990’. Currently, the UWB-IR
technology is an interesting candidate for close range Wireless Sensors Networks (WSNs). It
is particularly attractive for industrial sensor networks due to its resilience to multipath
interference, simple transceiver circuitry, accurate ranging ability, and low transmission
power. In order to secure data and communications in the Ad-Hoc UWB-IR networks,
UWB-IR requires suitable encryption protocols. In this paper, we review and summarize
the IEEE 802.15.4 security sub-layer protocol of UWB-IR based Symmetric Key
Cryptography scheme
Keywords
Ad-Hoc Networks, Certificateless, NTRU, Public key cryptography, Public key
cryptosystems, UltraWideBand Impulse Radio.
AIRCC Publishing Corporation
AIRCC Publishing Corporation
AIRCC Publishing Corporation
AIRCC Publishing Corporation
AIRCC Publishing Corporation
CONCLUSION
In this paper, we proved that the security suites of IEEE 802.15.4 are not adapted to Ad-Hoc
UWBIR network. Indeed, they have multiple problems and vulnerabilities, due to the use of
Symmetric Key Cryptosystem (AES) and specially the CCM mode. Unfortunately, the 802.15.4
standard, and all the chips that implement it, is not exempt of security flaws [24]. One of the
security suites, AES-CTR, is deeply flawed, since it does not properly support replay detection
and it is possible to launch denial of service (DoS) attacks sending a single forged packet. Also,
the acknowledgement packets are not protected by a MAC, thus it is possible to forge them.
Other minor problems include deleting the ACL when entering a low power mode.
AIRCC Publishing Corporation
For More Details Please Visit:
http://aircconline.com/ijwmn/V9N6/9617ijwmn04.pdf

More Related Content

What's hot

Intro to small cell
Intro to small cellIntro to small cell
Intro to small cellKasey Noe
 
計概報告家妃.Ppt
計概報告家妃.Ppt計概報告家妃.Ppt
計概報告家妃.Pptemily1202
 
MAST Mobile Autonomous Surveillance Trailer: 24/7 Day Night Imaging Off Grid ...
MAST Mobile Autonomous Surveillance Trailer: 24/7 Day Night Imaging Off Grid ...MAST Mobile Autonomous Surveillance Trailer: 24/7 Day Night Imaging Off Grid ...
MAST Mobile Autonomous Surveillance Trailer: 24/7 Day Night Imaging Off Grid ...Tim Troxel
 
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...ijtsrd
 
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...VK2MB
 
Wi max introduction
Wi max introductionWi max introduction
Wi max introductionVinay Diddi
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi TechnologyStudent
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi TechnologyAman Raj
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSnanocdac
 

What's hot (19)

4G technology
4G technology4G technology
4G technology
 
RUGGEDCOM WIN7000 wimax
RUGGEDCOM WIN7000 wimaxRUGGEDCOM WIN7000 wimax
RUGGEDCOM WIN7000 wimax
 
Intro to small cell
Intro to small cellIntro to small cell
Intro to small cell
 
Wi vi t echnology
Wi vi t echnologyWi vi t echnology
Wi vi t echnology
 
Mm wave
Mm waveMm wave
Mm wave
 
UWB precision location system
UWB precision location systemUWB precision location system
UWB precision location system
 
O4101101103
O4101101103O4101101103
O4101101103
 
計概報告家妃.Ppt
計概報告家妃.Ppt計概報告家妃.Ppt
計概報告家妃.Ppt
 
MAST Mobile Autonomous Surveillance Trailer: 24/7 Day Night Imaging Off Grid ...
MAST Mobile Autonomous Surveillance Trailer: 24/7 Day Night Imaging Off Grid ...MAST Mobile Autonomous Surveillance Trailer: 24/7 Day Night Imaging Off Grid ...
MAST Mobile Autonomous Surveillance Trailer: 24/7 Day Night Imaging Off Grid ...
 
Wi vi
Wi viWi vi
Wi vi
 
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
 
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
Manly Warringah Radio Society March 2013 Lecture - Mesh Potato's and Mesh Wif...
 
RUGGEDCOM WIN7200 wimax
RUGGEDCOM WIN7200 wimaxRUGGEDCOM WIN7200 wimax
RUGGEDCOM WIN7200 wimax
 
Wi max introduction
Wi max introductionWi max introduction
Wi max introduction
 
Camera
CameraCamera
Camera
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
 
WIMAX
WIMAXWIMAX
WIMAX
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 

Similar to CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK

CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKijwmn
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262MKEERTHIKA1
 
LoRa Technology - DNA of IoT
LoRa Technology - DNA of IoTLoRa Technology - DNA of IoT
LoRa Technology - DNA of IoTijtsrd
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET Journal
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
 
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...IJMER
 
A Brief Review on Wireless Networks
A Brief Review on Wireless NetworksA Brief Review on Wireless Networks
A Brief Review on Wireless NetworksIRJET Journal
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possibleIJNSA Journal
 
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTORIMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTORIRJET Journal
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 

Similar to CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK (20)

CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262
 
LoRa Technology - DNA of IoT
LoRa Technology - DNA of IoTLoRa Technology - DNA of IoT
LoRa Technology - DNA of IoT
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
 
Ft2510561062
Ft2510561062Ft2510561062
Ft2510561062
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
 
A Brief Review on Wireless Networks
A Brief Review on Wireless NetworksA Brief Review on Wireless Networks
A Brief Review on Wireless Networks
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
 
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTORIMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
 
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 

Recently uploaded

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 

Recently uploaded (20)

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 

CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK

  • 1. International Journal of Wireless & Mobile Networks (IJWMN) ISSN:0975-3834 [Online]; 0975-4679 [Print] http://airccse.org/journal/ijwmn.html
  • 2. Certificateless Scheme Based NTRU Cryptosystem for Ad-Hoc UWB-IR Network Jamel Miri, Innov'Com Laboratory, Tunisia AIRCC Publishing Corporation
  • 3. AIRCC Publishing Corporation Abstract From the radar and military research world’s, the Ultra-Wide Band Impulse Radio (UWB- IR) was adopted in the telecommunications world in the 1990’. Currently, the UWB-IR technology is an interesting candidate for close range Wireless Sensors Networks (WSNs). It is particularly attractive for industrial sensor networks due to its resilience to multipath interference, simple transceiver circuitry, accurate ranging ability, and low transmission power. In order to secure data and communications in the Ad-Hoc UWB-IR networks, UWB-IR requires suitable encryption protocols. In this paper, we review and summarize the IEEE 802.15.4 security sub-layer protocol of UWB-IR based Symmetric Key Cryptography scheme Keywords Ad-Hoc Networks, Certificateless, NTRU, Public key cryptography, Public key cryptosystems, UltraWideBand Impulse Radio.
  • 8. AIRCC Publishing Corporation CONCLUSION In this paper, we proved that the security suites of IEEE 802.15.4 are not adapted to Ad-Hoc UWBIR network. Indeed, they have multiple problems and vulnerabilities, due to the use of Symmetric Key Cryptosystem (AES) and specially the CCM mode. Unfortunately, the 802.15.4 standard, and all the chips that implement it, is not exempt of security flaws [24]. One of the security suites, AES-CTR, is deeply flawed, since it does not properly support replay detection and it is possible to launch denial of service (DoS) attacks sending a single forged packet. Also, the acknowledgement packets are not protected by a MAC, thus it is possible to forge them. Other minor problems include deleting the ACL when entering a low power mode.
  • 9. AIRCC Publishing Corporation For More Details Please Visit: http://aircconline.com/ijwmn/V9N6/9617ijwmn04.pdf