نتایج جستجو برای: group key management
تعداد نتایج: 2218760 فیلتر نتایج به سال:
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. This flexibility in space and time induces new challenges towards the security infrastructure needed to support secure unicast and multicast communications. Especially, traditional group key management architectures meant for wir...
Secure and efficient communication among a set of mobile nodes is one of the most important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must be implemented. Due to the resource scarcity in wireless networks, the protocols must be communication efficient and need as less computational power as possible. To secure the group broadcasting in wireless ...
In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing techniques such as passive participation. LEAP includes support for multiple symmetric keying mechanisms including individual keys, pairwise shared keys, cluster keys, and a group key. This design is based on the obse...
Vehicular Ad hoc Networks (VANETs) are the promising approach and also a key component of intelligent transport system. Its main aim is to provide driver convenience and safety. To improve security and balance the message overload the cluster approach and the key distribution technique is used. In this model first the network is analyzed based on its parameters and develop three models based on...
In recent years, mobile ad-hoc networks have received a great deal of attention in both academia and industry because they provide anytime-anywhere networking services. As wireless networks are rapidly deployed in the future, secure wireless environment will be mandatory. In this paper, we describe a group key management architecture and key agreement protocols for secure communication in mobil...
The security issues in ad hoc network are increasingly important. In this paper, we propose a distributed key management what approach by using braid groups and key tree. Without any assumption of prefixed trust relationship between nodes, the proposed method works in a self-organizing way to provide the key management services. The using of the proposed tree-based braid groups has following ad...
In cloud computing environment, resources are accessed by multiple members. Resources may be considered as VM, CPU, Storage etc. Group key management required when multiple members in group accesses the resources securely. In existing group key management, separate key trees are formed even if members are common in another group to access the resources. The solution to this is to form the combi...
This paper proposes a framework that enables secure one-to-many communication for networks with limited capabilities in the face of a strong adversary that can capture an arbitrary set of nodes. Our approach consists of two main components: (a) group key establishment protocol and (b) special key management. Especially, we try to address the following question: How strong of security properties...
RFC 4601 mandates the use of IPsec to ensure authentication of the link-local messages in the Protocol Independent Multicast Sparse Mode (PIM-SM) routing protocol. This document specifies mechanisms to authenticate the PIM-SM link-local messages using the IP security (IPsec) Encapsulating Security Payload (ESP) or (optionally) the Authentication Header (AH). It specifies optional mechanisms to ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید