Group Key Management Mechanism for Secure Device in AMI Environment
نویسندگان
چکیده
منابع مشابه
Secure Key Management Scheme for Ami in Smart Grid
The smart grid has been introduced as the next generation power grid. Advanced Metering Infrastructure (AMI) is one of the key components in this grid. It provides bidirectional communication between consumers and management entities in the utility side. This bidirectional nature communication flow has made AMI vulnerable to various cyber attacks. So, cyber security has become an important conc...
متن کاملHeterogeneous Device Networking for an AmI Environment
Assisted living environments involve a wide range of different devices. Most of them are commercially available, but typically associated to standard domotics buses not compatible with each other. Besides, in many cases it is desirable to integrate new devices to a system that might not support the installed bus protocol. Interconnection between devices is far from simple, specially because dom...
متن کاملKey Management for Secure Multicast Group Communication in Mobile Networks
—This paper describes the implementation of a hierarchical key management system to provide secure multicast communications in mobile network environments. By using this hierarchical system, both efficiency and security are improved and a highly scalable system is created.
متن کاملPerformance Optimizations for Group Key Management Schemes for Secure Multicast
Scalable group rekeying is one of the biggest challenges that need to be addressed to support secure communications for large and dynamic groups. In recent years, many group key management approaches based on the use of logical key trees have been proposed to address this issue. Using logical key trees reduces the complexity of group rekeying operation from O(N) to O(logN), where N is the group...
متن کاملSecure authenticated group key agreement protocol in the MANET environment
Due to dynamic and infrastructure-less nature of Mobile Ad hoc Network (MANET) environment, there exist number of threats as mobile devices and nodes could freely move around in MANET such as eavesdropping of communications channels, modification of sensitive m-commerce transactions, Denial of Service(DoS), vulnerabilities of impersonation by malicious insiders etc. In this paper, we propose a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Korea Navigation Institute
سال: 2012
ISSN: 1226-9026
DOI: 10.12673/jkoni.2012.16.4.679