Key Establishment Protocol for Computation-limited Devices
نویسندگان
چکیده
This paper present a new protocol based on symmetric encryption, which has quasi-forward secrecy and resistance to quasi-key compromise impersonation. It is a protocol suitable for computation-limited devices. Also by blinding the long-term key, we make the attack to long-term key harder.We have done the theoretical analysis and will finish the simulation and implementation.
منابع مشابه
Computation-efficient key establishment in wireless group communications
Efficient key establishment is an important problem for secure group communications. The communication and storage complexity of group key establishment problem has been studied extensively. In this paper, we propose a new group key establishment protocol whose computation complexity is significantly reduced. Instead of using classic secret sharing, the protocol only employs a linear secret sha...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملNovel Key Storage and Management Solution for the Security of Wireless Sensor Networks
As wireless sensor networks continue to grow in usage for distinct applications. Storage (memory) requirement and security are major problems for these resource limited networks. This paper present a novel and an efficient key establishment and management scheme for WSNs, named Random Initial and Master Key (RIMK).We showed that our proposed technique, manages keys randomly with less storage (i...
متن کاملAuthenticated Key Exchange Protocols for Parallel
We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of large-scale distributed file systems supporting parallel access to multiple storage devices. Our work focuses on the current Internet standard for such file systems, i.e., parallel Network File System (pNFS), which makes use of Kerberos to establish parallel session ...
متن کاملA Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Secure Group Communication
This paper addresses an interesting security problem in wireless ad hoc networks: the Dynamic Group Key Agreement key establishment. For secure group communication in an Ad hoc network, a group key shared by all group members is required. This group key should be updated when there are membership changes (when the new member joins or current member leaves) in the group. In this paper, We propos...
متن کامل