Secure Spread: An Integrated Architecture for Secure Group Communication
نویسندگان
چکیده
منابع مشابه
A Secure Certificate for Secure Group Communication
Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distribut...
متن کاملSecure Group Communication for Cassandra
Cassandra is a distributed NoSQL system providing high scalability and availability. However, it has many security vulnerabilities. Especially the information about internal cluster structure and transferred data can be exposed by outside attackers. In this paper, we present a novel way to enhance Cassandra security by means of group key. The group key model is designed considering Cassandra’s ...
متن کاملLightweight Secure Group Communication
An advantage of today’s high speed networks is the ability to support group communication. Applications that support group communication allow the free exchange of ideas and data in real time, regardless of the physical distance between the participants. Unfortunately, support for additional protocol features such as reliability, secrecy, and total ordering in the multicast context requires mor...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملDistance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2005
ISSN: 1545-5971
DOI: 10.1109/tdsc.2005.39