Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Multipath Routing Scheme using Key Pre-Distribution in Wireless Sensor Networks

Multipath routing in WSN has been a long wish in security scenario where nodes on next-hop may be targeted to compromise. Many proposals of Multipath routing has been proposed in ADHOC Networks but under constrained from keying environment most seems ignorant. In WSN where crucial data is reported by nodes in deployment area to their securely located Sink, route security has to be guaranteed. U...

متن کامل

Secure Key Distribution via Pre- and Post-Selected Quantum Ensembles

A quantum key distribution scheme whose security depends on the features of preand post-selected quantum ensembles is described. PACS numbers: 03.65.Bz, 42.80.Sa, 89.70.+c A wide variety of quantum key distribution schemes have been proposed, following the original Bennett and Brassard protocol [1]. Ekert [2] has described a scheme in which two parties, Alice and Bob, create a shared random key...

متن کامل

Secure quantum key distribution using squeezed states

We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finitedimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel ...

متن کامل

Secure Key Pre-distribution in Wireless Sensor Networks Using Combinatorial Design and Traversal Design Based Key Distribution

Security is an indispensable concern in Wireless Sensor Network (WSN) due to the presence of potential adversaries. For secure communication in infrastructureless sensor nodes various key predistribution have been proposed. In this paper we have evaluated various existing deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing ...

متن کامل

A Novel Approach for Secure Routing through Bgp Using Symmetric Key

The Border Gateway Protocol (BGP) is the path vector routing protocol that connects different autonomous systems.. These ASes have unique integer numbers which assign by IANA organization. The traditional BGP protocol is not sufficient to provide security and authentication for AS path and verification of AS number ownership as well as network IP prefix. The BGP remains vulnerable to various ty...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Mobile Computing

سال: 2016

ISSN: 1536-1233

DOI: 10.1109/tmc.2015.2486758