Practical Attacks on Hybrid Group Key Management for SOHAN

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Attacks on Hybrid Group Key Management for SOHAN

549 Abstract— Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed ...

متن کامل

Under New Management: Practical Attacks on SNMPv3

Network monitoring is a necessity for both reducing downtime and ensuring rapid response in the case of software or hardware failure. Unfortunately, one of the most widely used protocols for monitoring networks, the Simple Network Management Protocol (SNMPv3), does not offer an acceptable level of confidentiality or integrity for these services. In this paper, we demonstrate two attacks against...

متن کامل

Practical Key Recovery Attacks On Two McEliece Variants

The McEliece cryptosystem is a promising alternative to conventional public key encryption systems like RSA and ECC. In particular, it is supposed to resist even attackers equipped with quantum computers. Moreover, the encryption process requires only simple binary operations making it a good candidate for low cost devices like RFID tags. However, McEliece’s original scheme has the drawback tha...

متن کامل

Efficient Practical Key Recovery for Side-Channel Attacks

Side-channel attacks impose serious threats to the security of a cryptographic device. These attacks exploit the physical properties of a device in order to recover the secret key involved in the computations. Most side-channel attacks yield ranking lists of candidates for different parts of the secret key. The lists of candidates are typically ranked in the decreasing order of their likelihood...

متن کامل

Secure group communication over MANET using hybrid Key Management

In many newly emerging network there is a need to provide secure transmission within the network.MANET is one such network which requires secure group communication.The key concept in security is key management.In the existing key management systems third party is fully trusted for key generation.Hence the trustworthiness of third party is more important to provide secure communication.Here we ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of information and communication convergence engineering

سال: 2010

ISSN: 2234-8255

DOI: 10.6109/jicce.2010.8.5.549