نتایج جستجو برای: symmetric key management

تعداد نتایج: 1422366  

Journal: :Wireless Networks 2015
Yu Seung Kim Patrick Tague Heejo Lee Hyogon Kim

Prevalent Wi-Fi networks have adopted various protections to prevent eavesdropping caused by the intrinsic shared nature of wireless medium. However, many of them are based on pre-shared secret incurring key management costs, and are still vulnerable from practical countermeasures. In this study, we investigate the feasibility of using defensive jamming technique to protect enterprise Wi-Fi net...

Journal: :EURASIP J. Adv. Sig. Proc. 2008
Francis Minhthang Bui Dimitrios Hatzinakos

As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types...

2015
Nabil Ghanmy Lamia Chaari Fourati Lotfi Kamoun

Key management and authentication are essential modules for network security provisioning especially for Wireless Sensor Networks (WSN). Make available these two services by using symmetric cryptosystems in software implementation are challenging that’s not providing a perfect trade-off between resilience and performance. Asymmetric approaches with public key cryptosystems, specifically Ellipti...

2016
Thomas Shrimpton Martijn Stam Bogdan Warinschi

Application Programming Interfaces (APIs) to cryptographic tokens like smartcards and Hardware Security Modules (HSMs) provide users with commands to manage and use cryptographic keys stored on trusted hardware. Their design is mainly guided by industrial standards with only informal security promises. In this paper we propose cryptographic models for the security of such APIs. The key feature ...

Journal: :Wireless Networks 2015
Tao Wang Yao Liu Athanasios V. Vasilakos

Channel reciprocity based key establishment techniques have attracted more and more attention from the wireless security research community for its easy implementation, low computational requirement, and small energy consumption. The basic idea of these techniques is to establish a shared key by utilizing the wireless channel reciprocity, i.e., the transmitter and receiver of one wireless link ...

Journal: :IET Information Security 2008
Gautam Biswas

Diffie –Hellman technique: extended to multiple two-party keys and one multi-party key Abstract: The two-party Diffie– Hellman (DH) key-exchanging technique is extended to generate (i) multiple two-party keys and (ii) one multi-party key. The participants in the former case exchange two public keys and generate 15 shared keys. Of these, 4 keys are called base keys, because they are used to gene...

Journal: :J. Parallel Distrib. Comput. 2007
Ananya Gupta Anindo Mukherjee Bin Xie Dharma P. Agrawal

7 With the support of cellular system a cellular-based mobile ad hoc network (MANET) offers promising communication scenarios while entails secure data exchange as other wireless systems. In this paper, we propose a novel decentralized key generation mechanism using shared 9 symmetric polynomials in which the base stations (BSs) carry out an initial key generation by a symmetric polynomial in a...

2005
Jun ANZAI Tsutomu Matsumoto Junji Shikata Seiichiro Kagei Tomoharu Nagao

Finally, I want to express my deepest gratitude to my wife Chikako, my daughter Tsugumi, and my son Tenga for their support and encouragemet. Abstract The subjects of this thesis are secure key management and secure location management for mobile nodes on wireless mobile networks. Recently, mobile networks become increasingly popular with the widespread availability of cellular phones and noteb...

2007
Anatoly Temkin

Knowledge of mathematical foundations of Cryptography is of paramount importance for students wanting to succeed in graduate degree programs in Computer Science with concentration in security. Cryptography, a relatively new field, has yet to establish a core set of topics and the optimal sequence of their presentation to prepare students for a career in the field of IT security. This paper pres...

2006
Joao Girão Miquel Martin

Once a wireless sensor network (WSN) is stable and has been running for a while, sensors start to fail due to hardware problems, battery exhaustion or even due to their physical destruction. In any case, the administrator of the network may wish to replace the damaged nodes with new ones to reinforce the coverage area. In this paper we make use of an out of band channel (OOB) to bootstrap an au...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید