نتایج جستجو برای: symmetric key management
تعداد نتایج: 1422366 فیلتر نتایج به سال:
-While satisfying security requirements is crucial for secure group communications in wireless systems, mobile group applications often have application-specific performance requirements in terms of timeliness, reliability, and system reconfigurability. Often there exists a tradeoff between security versus performance goals since security protocols may introduce undue computational and network ...
For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as an appropriate trusted gateway for external machines with low communication needs. A message-based approach is best in such a scenario with moving mobile phones and machines. We propose a security model for access control to the communication infrastructure that is also messa...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which can directly extract, as cleartext, the value of sensitive keys. In particular, the API does not impose any limitation on the different roles a key can assume, and it permits to perform conflicting operations such as asking the token to wrap a key with another one and then to decrypt it. Fixes pro...
In this paper we first propose an encryption scheme for encryption of MPEG video data using PKI, second, we propose a shared key pool and encryption/decryption of multimedia data. Third, to reduce huge play-out delay time which occurs when performing decryption on large capacity multimedia data, a double buffer configuration is adopted and a real-time decryption scheme using efficient buffer sc...
Wireless Sensor Network (WSN) is frequently exposed to attackers. The data transmission in secure channel enhances the data confidentiality. This paper discusses multiple schemes with different approaches. Periodic key updating becomes a main point in the design of each scheme. The key updating enhances the security level because of the difficulties added in the network cracking. The performanc...
In the EYES project (http://eyes.eu.org), we are investigating self-organizing, collaborative, energy-efficient sensor networks. This study is devoted to the security aspects of the project. Our contribution is three-fold: firstly, we present a survey, where we discuss the dominant issues of energy-security trade-off in the network protocol and key management design space. From there we set out...
Wireless Sensor Networks (WSNs) are more vulnerable to security attacks than wired networks because of their wireless and dynamic nature. In today’s WSNs, the sensor nodes act not only as routers but also as communication endpoints, and they are also responsible for the security of the messages. Therefore, it is important to define whether an incoming message originates from a trustworthy node ...
Mobile ad hoc networks (MANETs) are known to be unprotected due to the nature of message propagation and the openness of public channel. Another important characteristic of MANETs is their being basically energy constrained. While it is known that symmetric key cryptography provides a high degree of secrecy and efficiency, but has a number of significant difficulties for the MANET domain in key...
In many network applications, including distant learning, audio webcasting, video streaming, and online gaming, often a source has to send data to many receivers. IP multicasts and application-layer multicasts provide efficient and scalable one-to-many or many-to-many communications. A common secret key, the group key, shared by multiple users can be used to secure the information transmitted i...
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید