نتایج جستجو برای: key management

تعداد نتایج: 1347875  

2004
Anindo Mukherjee Hongmei Deng Dharma P. Agrawal

The infrastructure-less property of wireless ad hoc network makes the traditional central server based security management schemes unsuitable and requires the use of a distributed key management mechanism. In this paper, we propose a distributed pairwise key establishment scheme based on the concept of bivariate polynomials. In our method, any mobile node in an ad hoc network can securely commu...

Journal: :I. J. Network Security 2008
Said Gharout Yacine Challal Abdelmadjid Bouabdallah

In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications require confidentiality for transmitted data. So, a traffic encryption key is used to assure this confidentiality and has to be changed and distributed to all valid members whenever a membership change (join or leave) occur...

Journal: :CoRR 2017
Hamzeh Ghasemzadeh Ali Payandeh Mohammad Reza Aref

Security is a critical and vital task in wireless sensor networks (WSNs), therefore different key management systems have been proposed, many of which are based on symmetric cryptography. Such systems are very energy efficient, but they lack some other desirable characteristics. On the other hand, systems based on public key cryptography (PKC) have those desirable characteristics, but they cons...

2008

wireless connectivity and frequently changing network topology. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority, i.e. fixed infrastructure. With that view in mind, group key management plays an important building block of any secure group communication. The main contribution of this pap...

2001
Huaxiong Wang

Multicast communication is the main mode of communication for a wide range of Internet services such as video broadcasting and multi-party teleconferencing where there are multiple recipients. A secure multicast system allows a group initiator (or a centre) to send message over a multicast channel to a dynamically changing group of users. The main challenge in secure multicasting is efficient g...

2006
Yong Ho Kim Hwaseong Lee Dong Hoon Lee Jongin Lim

To guarantee secure communication in wireless sensor networks, secret keys should be securely established between sensor nodes. Recently, an efficient security mechanism was proposed for large-scale distributed sensor networks by Zhu, Setia, and Jajodia. In their scheme, each node uses a single initial key to establish pair-wise keys and erases the key after key setup. If the key is compromised...

2010
Mathias Björkqvist Christian Cachin Robert Haas Xiao-Yu Hu Anil Kurmus René Pawlitzek Marko Vukolic

Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed comprehensively so far. First, KLMS introduces a pattern-based method to simplify and to automate the deployment task for keys and certificates, i.e., the task of associating them with endpoints that use them. Currently,...

2012
Rony H. Rahman Lutfar Rahman

Ad hoc networks are characterized by multi-hop wireless connectivity and frequently changing network topology. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority, i.e. fixed infrastructure. With that view in mind, group key management plays an important building block of any secure group c...

Journal: :CoRR 2016
Vinod Kumar S. K. Pandey Rajendra Kumar

In the secure group communication, data is transmitted in such a way that only the group members are able to receive the messages. The main problem in the solution using symmetric key is heavy re-keying cost. To reduce re-keying cost tree based architecture is used. But it requires extra overhead to balance the keytree in order to achieve logarithmic re-keying cost. The main challenging issue i...

Journal: :JCP 2014
Qiuna Niu

With the popularity of group-oriented applications, secure and efficient communication among all group members has become a major issue. An efficient key management mechanism is the base and critical technology of secure group communications. A distributed grouporiented key management scheme without the participation of third parties is proposed in the paper. The scheme deploys Elliptic Curve D...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید