نتایج جستجو برای: key management

تعداد نتایج: 1347875  

1990
Walter Fumy Michael Munzert

The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic mechanisms. As a result of varied design decisions appropriate to different conditions, a large variety of key distribution protocols exist. There is a need tu explicate key distribution protocols in a way that allows to understand which results t...

2008
Abraham Jibi K. S. Ramanatha

Wireless Sensor Networks are prone to many security attacks. The most complex among them is the node compromise attack. Networks enhanced with services like aggregation and security require a different intrusion detection mechanism than the generally used solutions and there is a possibility of a compromised node producing false intrusion detection alarms. Therefore we need suitable mechanisms ...

Journal: :JCM 2013
Kuo Zhao Longhe Huang Hongtu Li Fangming Wu Jianfen Chu Liang Hu

In mobile ad hoc networks (MANETs), the research on key management of identity-based scheme is attracting more and more attention. In this paper, we study on four types of identity-based schemes which resist key escrow problem at different degrees, and introduce several schemes for each type. Then, we give an overview of the characteristics of their key management, and made a summary of key gen...

2008
Katrin Hoeper Lidong Chen Antonio Izquierdo Manzanares Nada Golmie

In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on utilizing existing keying material from previous access authentications to expedite network entry. For a seamless handover, keys must be available at the target network at the time of the handover. Currently, industry is still exploring possible ways to handle keys for ...

Journal: :Electr. Notes Theor. Comput. Sci. 2008
Keith M. Martin Maura B. Paterson

The term wireless sensor network is applied broadly to a range of significantly different networking environments. On the other hand there exists a substantial body of research on key establishment in wireless sensor networks, much of which does not pay heed to the variety of different application requirements. We set out a simple framework for classifying wireless sensor networks in terms of t...

Journal: Money and Economy 2011
Efzal Ali,

 A global economic recovery is expected to be ignited in 2010 but this will be characterized by very different growth trajectories among advanced and emerging economies. The downside risks are formidable. Sustaining this recovery will require skillful macroeconomic management. Exit strategies for fiscal stimulus will need to be carefully timed and credible fiscal consolidation plans nee...

2006
Alexandre Gava Menezes Carlos Becker Westphall

A wireless sensor network is a collection of devices limited in lowpowered batteries, processing, communication bandwidth capabilities and low memory availability. Due to these constraints, most of security approaches used in wired networks cannot be applied directly in this environment. In this work, we present a hybrid protocol that treats the group key management scheme and the transparent c...

2015
Damir Omerasevic Narcis Behlilovic Sasa Mrdovic

The paper proposes key management between two parties, based on set of multimedia files shared by sender and recipient. The method is simple, fast, secure and robust. Possible key sizes are virtually limitless. One implementation, which uses YouTube website as a source of multimedia files, is presented.

Journal: :CoRR 2010
Anvesh Aileni

Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. In this paper, the whole network of sensor nodes is divided into clusters based on their physical locations. In addition, efficient ways of key distribution among the nodes within the cluster and among controllers of each cluster are discussed. Also, inter and intra cluster communications...

Journal: :IJCNIS 2010
Miguel Garcia Jaime Lloret Mauri Sandra Sendra Raquel Lacuesta Gilaberte

Nowadays, Wireless Sensor Networks are a hot research topic in the scientific community. Researchers seek to maximize their autonomy while paying attention to their limited resources, few computing capacity and low energy consumption. Security mechanisms must be deployed in the architecture of almost all Wireless Sensor Networks. Several research papers have verified that group-based communicat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید