نتایج جستجو برای: key management

تعداد نتایج: 1347875  

2011
Pei Yuan Shen Vicky Liu Maolin Tang William J. Caelli

The major purpose of Vehicular Ad Hoc Networks (VANETs) is to provide safety-related message access for motorists to react or make a life-critical decision for road safety enhancement. Accessing safety-related information through the use of VANET communications, therefore, must be protected, as motorists may make critical decisions in response to emergency situations in VANETs. If introducing s...

1995
Mihir Bellare Amir Herzberg Michael Steiner Gene Tsudik Michael Waidner Ralf C. Hauser Juan A. Garay

This paper proposes a family of protocols { iKP (i = 1; 2; 3) { for secure electronic payments over the Internet. The protocols implement credit card-based transactions between the customer and the merchant while using the existing nancial network for clearing and authorization. The protocols can be extended to apply to other payment models, such as debit cards and electronic checks. They are b...

Journal: :J. Inf. Sci. Eng. 2008
Juan Hernández-Serrano Josep Pegueroles Miguel Soriano

Services in MANETs tend to be decentralized in order to share their cost between their subscribers. Security is not an exception and thus shared self-organized security schemes must be provided. Group Key Management (GKM) deals with the responsibility of providing privacy and group authentication in group communications focusing in the dynamism of the group (joins and leaves). We present a shar...

Journal: :CoRR 2012
Mohamed Nabeel John Zage Sam Kerr Elisa Bertino N. Athula Kulatunga U. Sudheera Navaratne Michael Duren

The smart power grid promises to improve efficiency and reliability of power delivery. This report introduces the logical components, associated technologies, security protocols, and network designs of the system. Undermining the potential benefits are security threats, and those threats related to cyber security are described in this report. Concentrating on the design of the smart meter and i...

Journal: :J. Inform. and Commun. Convergence Engineering 2009
DongGook Park

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/ SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environmen...

2012
Ramu kuchipudi N Md Jubair Basha

Wireless sensor networks pose new security and privacy challenges. One of the important challenges is how to bootstrap secure communications among nodes. Several key management schemes have been proposed. However, they either cannot offer strong resilience against node capture attacks, or require too much memory for achieving the desired connectivity. The proposed Bloms algorithm outperforms ot...

2009
Hani Alzaid DongGook Park Juan Manuel González Nieto Colin Boyd Ernest Foo

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment...

2012
P. Neelamegam

The real challenges in the field of Wireless Sensor Networks (WSN) are to control the trade-off between providing security and conserving scarce resources. To provide security besides cryptographic primitives, secret key also play a vital role. The reason for key management is to set up and to provide secure channels among sensor nodes in WSN applications. Various key management schemes are pro...

1998
T. Hardjono B. Cain N. Doraswamy

This document provides a framework for group key management for multicast security, motivated by three main considerations, namely the multicast application, scalability and trust-relationships among entities. It introduces two planes corresponding to the network entities and functions important to multicasting and to security. The key management plane consists of two hierarchy-levels in the fo...

2014
Sarmad Ullah Khan Rafiullah Khan Inam Bari Naveed Jan

Recently, wireless sensor networks have attracted the attention of research comunity due to its numerous applications especially in mobility scenarios. however it also increases the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Hence a proper key management scheme needs to be proposed to secure both information and conn...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید