نتایج جستجو برای: key management
تعداد نتایج: 1347875 فیلتر نتایج به سال:
The major purpose of Vehicular Ad Hoc Networks (VANETs) is to provide safety-related message access for motorists to react or make a life-critical decision for road safety enhancement. Accessing safety-related information through the use of VANET communications, therefore, must be protected, as motorists may make critical decisions in response to emergency situations in VANETs. If introducing s...
This paper proposes a family of protocols { iKP (i = 1; 2; 3) { for secure electronic payments over the Internet. The protocols implement credit card-based transactions between the customer and the merchant while using the existing nancial network for clearing and authorization. The protocols can be extended to apply to other payment models, such as debit cards and electronic checks. They are b...
Services in MANETs tend to be decentralized in order to share their cost between their subscribers. Security is not an exception and thus shared self-organized security schemes must be provided. Group Key Management (GKM) deals with the responsibility of providing privacy and group authentication in group communications focusing in the dynamism of the group (joins and leaves). We present a shar...
The smart power grid promises to improve efficiency and reliability of power delivery. This report introduces the logical components, associated technologies, security protocols, and network designs of the system. Undermining the potential benefits are security threats, and those threats related to cyber security are described in this report. Concentrating on the design of the smart meter and i...
Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/ SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environmen...
Wireless sensor networks pose new security and privacy challenges. One of the important challenges is how to bootstrap secure communications among nodes. Several key management schemes have been proposed. However, they either cannot offer strong resilience against node capture attacks, or require too much memory for achieving the desired connectivity. The proposed Bloms algorithm outperforms ot...
Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment...
The real challenges in the field of Wireless Sensor Networks (WSN) are to control the trade-off between providing security and conserving scarce resources. To provide security besides cryptographic primitives, secret key also play a vital role. The reason for key management is to set up and to provide secure channels among sensor nodes in WSN applications. Various key management schemes are pro...
This document provides a framework for group key management for multicast security, motivated by three main considerations, namely the multicast application, scalability and trust-relationships among entities. It introduces two planes corresponding to the network entities and functions important to multicasting and to security. The key management plane consists of two hierarchy-levels in the fo...
Recently, wireless sensor networks have attracted the attention of research comunity due to its numerous applications especially in mobility scenarios. however it also increases the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Hence a proper key management scheme needs to be proposed to secure both information and conn...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید