نتایج جستجو برای: group key management

تعداد نتایج: 2218760  

Journal: :JCP 2014
Qiuna Niu

With the popularity of group-oriented applications, secure and efficient communication among all group members has become a major issue. An efficient key management mechanism is the base and critical technology of secure group communications. A distributed grouporiented key management scheme without the participation of third parties is proposed in the paper. The scheme deploys Elliptic Curve D...

2011
N. Suganthi

Problem statement: Key management is an important cryptographic technique for providing security in a dynamic environment of sensor networks. To provide a secure communication among a group of sensor nodes keys should established in an efficient manner. We introduced an efficient and dynamic key management system for dynamic sensor networks. Approach: We pre deployed some of the keying material...

2008

wireless connectivity and frequently changing network topology. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority, i.e. fixed infrastructure. With that view in mind, group key management plays an important building block of any secure group communication. The main contribution of this pap...

2014
Abbas Mehdizadeh Fazirulhisyam Hashim Raja S. Azmir Raja Abdullah

Key management is one of the challenging issues in group communications. It is generally used to secure multicast data transmission as well as preventing potential eavesdropping by malicious attackers. Group security key should be maintained for data encryption, while group key update and dissemination processes are required when a new user joins or leaves the group, which eventually lead to hi...

Journal: :Computer Communications 2007
Guojun Wang Jie Ouyang Hsiao-Hwa Chen Minyi Guo

Multi-privileged group communications containing multiple data streams have been studied in the traditional wired network environment and the Internet. With the rapid development of mobile and wireless networks and in particular mobile ad-hoc networks (MANETs), the traditional Internet has been integrated with mobile and wireless networks to form the mobile Internet. The multi-privileged group ...

2010
Mohamed Salah Bouassida Mohamed Bouali

The establishment of Group Key Management Protocols (GKMPs) is the most suitable solution to provide secure multicast communication within ad hoc networks. However, these protocols have to take into account the characteristics of a such environment, with mobility of nodes, wireless links and low capacities. The evaluation of these protocols becomes thus mandatory to guarantee their adequacy and...

2016
David C. Wyld

Security is one of the inherent challenges in the area of Wireless Sensor Network (WSN). At present, majority of the security protocols involve massive iterations and complex steps of encryptions thereby giving rise to degradation of quality of service. Many WSN applications are based on secure group communication. In this paper, we have proposed a scheme for secure group key management with si...

Journal: :IACR Cryptology ePrint Archive 2012
Muhammad Yasir Malik

Key management in multicast dynamic groups, where users can leave or join at their ease is one of the most crucial and essential part of secure communication. Various efficient management strategies have been proposed during last decade that aim to decrease encryption costs and transmission overheads. In this report, two different types of key management schemes are proposed. First proposed sch...

2003
Yan Sun K. J. Ray Liu

An important application of multicasting is group-oriented multimedia communication, such as video-on-demand and video conferencing. Before these services can be successfully deployed, security infrastructures must be developed to ensure access control to multicast content. In this paper, we present a multi-group key management scheme tailored to multimedia multicast services that distribute da...

2017
Amar Buchade Rajesh Ingle

In cloud computing, immediate access of resources is important due to cost incurred to customer by pay per use model of cloud computing. Usually resource is protected by using cryptography technique. The resource may be shared by multiple members in group. There can be overlapping members to access the multiple resources. Group key management is important to form the group key to access the res...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید