نتایج جستجو برای: rekeying

تعداد نتایج: 186  

2013
B. Gopalakrishnan A. Shanmugam

A secure group communication in Mobile Ad-Hock Networks is challenging due to the mobility and limitations in computational and battery power of the nodes. This can be achieved by multicast routing protocol that ensures security through key management schemes. In this paper we proposed an energy efficient multicast routing protocol to establish the group in MANETS. In order to preserve security...

Journal: :Ad Hoc Networks 2007
Yixin Jiang Chuang Lin Minghui Shi Xuemin Shen

A novel key distribution scheme with time-limited node revocation is proposed for secure group communications in wireless sensor networks. The proposed scheme offers two important security properties: the seal-healing re-keying message distribution which features periodic one-way re-keying with implicitly authentication, efficient tolerance for the lost rekeying messages, and seamless Traffic E...

Journal: :JCM 2008
Li Xu Jianwei Chen Xiaoding Wang

Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly used to construct orthogonal arrays in order to obtain t-packing designs quickly. Based on cover-free family properties, t-packing designs are adopted in key predistribution phase. Then based secure key-shared method, the pre-d...

2002
Mana Taghdiri Daniel Jackson

Alloy, a lightweight modelling language based on relations, is used to construct a framework for modelling a class of key management schemes used in secure multicast, aimed at checking them against some critical correctness properties that should be satisfied by all secure multicast protocols. This framework is used to model pull-based Asynchronous Rekeying Framework (ARF) and Iolus, two very d...

Journal: :IACR Cryptology ePrint Archive 2004
Junghyun Nam Sungduk Kim Seungjoo Kim Dongho Won

Group key agreement protocols are designed to solve the fundamental problem of securely establishing a session key among a group of parties communicating over a public channel. Although a number of protocols have been proposed to solve this problem over the years, they are not well suited for a high-delay wide area network; their communication overhead is significant in terms of the number of c...

2015
Muhammad Jawad Ikram

The ubiquitous nature of smartphones and GPSenabled devices, coupled with the increasingly popular usage of location-based services, has effectively created an environment where data access truly is anywhere at any time. While said environment is indeed convenient and quite useful, the unfortunate reality is that users are exposed to a variety of privacy and security threats. User location info...

2015
Jyh-How Huang Shivakant Mishra

This paper describes the support provided for mobility and fault tolerance in Mykil, which a key distribution protocol for large, secure group multicast. Mykil is based on a combination of group-based hierarchy and key-based hierarchy systems for group key management. Important advantages of Mykil include a fast and efficient rekeying operation for large group sizes, continuous availability of ...

2003
Sencun Zhu Sanjeev Setia Sushil Jajodia

We study two important issues related to the Subset Difference Rekeying (SDR) method [4]. First, we present a reliable key distribution scheme, called WFEC-BKR, that enables members to receive the current group key in a reliable and timely fashion inspite of packet losses in the network. Through simulation, we show that in most scenarios, WFEC-BKR outperforms previously proposed schemes for rel...

2016
Mohammad Mehdi Gilanian Sadeghi M. M. G. Sadeghi

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

2010
Ning Shang Mohamed Nabeel Elisa Bertino Xukai Zou

Secure collaborative applications currently enabled by the Internet need flexible and efficient mechanisms for managing and distributing group keys. The secure transmission of information among collaborating users should be efficient as well as flexible in order to support access control models with different granularity levels for different kinds of applications such as secure group communicat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید