منابع مشابه
Performance Comparison of Distributed Group Key Management Protocol based on Region based Group Key Management
A mobile ad hoc network is an autonomous system of mobile nodes connected by wireless links. The nodes are free to move about and organize themselves into a network. For many application of MANET we need to establish secure group communication between members of groups. Some of the protocols to generate group key have been surveyed, and then their comparison is given based on the fact that if w...
متن کاملGroup key management based on semigroup actions
In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way. We provide security proofs against passive attacks and suitable examples that may enhance both the security level and communication overheads of previous existing protocols.
متن کاملAttribute Based Group Key Management
Attribute based systems enable fine-grained access control among a group of users each identified by a set of attributes. Secure collaborative applications need such flexible attribute based systems for managing and distributing group keys. However, current group key management schemes are not well designed to manage group keys based on the attributes of the group members. In this paper, we pro...
متن کاملHierarchical Scalable Group Key Management Based on Chinese Remainder Theorem
In this paper, we present a new group key management protocol based on the Chinese Remainder Theorem (CRT), which is developed based on our previous paper [29]. By shifting more computing load onto the key server we optimized the number of re-key broadcast message, user-side key computation and number of key storages. Our protocol, Hierarchical Chinese Remaindering Group Key (HCRGK) Protocol, o...
متن کاملGroup Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network
In the recent times the concept of group key management is found to be one of the very essential issues in the field of wireless sensor network. Because of the dual impact limitations and various operations in open and hash environment the security and confidentiality which are considered as very challenging issues in WSN. The main issues which are associated with securing the sensor network ha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science and Application
سال: 2013
ISSN: 2161-8801,2161-881X
DOI: 10.12677/csa.2013.37052