نتایج جستجو برای: group key management

تعداد نتایج: 2218760  

2004
Mohamed Salah Bouassida Isabelle Chrisment Olivier Festor

An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. This flexibility in space and time induces new challenges towards the security infrastructure needed to support secure unicast and multicast communications. Especially, traditional group key management architectures meant for wir...

2002
Xiang-Yang Li Yu Wang Ophir Frieder

Secure and efficient communication among a set of mobile nodes is one of the most important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must be implemented. Due to the resource scarcity in wireless networks, the protocols must be communication efficient and need as less computational power as possible. To secure the group broadcasting in wireless ...

2003
Sencun Zhu Sanjeev Setia Sushil Jajodia

In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing techniques such as passive participation. LEAP includes support for multiple symmetric keying mechanisms including individual keys, pairwise shared keys, cluster keys, and a group key. This design is based on the obse...

2015
A. Deepika

Vehicular Ad hoc Networks (VANETs) are the promising approach and also a key component of intelligent transport system. Its main aim is to provide driver convenience and safety. To improve security and balance the message overload the cluster approach and the key distribution technique is used. In this model first the network is analyzed based on its parameters and develop three models based on...

Journal: :J. Inf. Sci. Eng. 2005
Kyung Hyune Rhee Young-Ho Park Gene Tsudik

In recent years, mobile ad-hoc networks have received a great deal of attention in both academia and industry because they provide anytime-anywhere networking services. As wireless networks are rapidly deployed in the future, secure wireless environment will be mandatory. In this paper, we describe a group key management architecture and key agreement protocols for secure communication in mobil...

Journal: :Computer and Information Science 2011
Thanongsak Aneksrup Pipat Hiranvanichakorn

The security issues in ad hoc network are increasingly important. In this paper, we propose a distributed key management what approach by using braid groups and key tree. Without any assumption of prefixed trust relationship between nodes, the proposed method works in a self-organizing way to provide the key management services. The using of the proposed tree-based braid groups has following ad...

Journal: :I. J. Network Security 2016
Amar Buchade Rajesh Ingle

In cloud computing environment, resources are accessed by multiple members. Resources may be considered as VM, CPU, Storage etc. Group key management required when multiple members in group accesses the resources securely. In existing group key management, separate key trees are formed even if members are common in another group to access the resources. The solution to this is to form the combi...

Journal: :Security and Communication Networks 2015
Pawel Szalachowski Tiffany Hyun-Jin Kim

This paper proposes a framework that enables secure one-to-many communication for networks with limited capabilities in the face of a strong adversary that can capture an arbitrary set of nodes. Our approach consists of two main components: (a) group key establishment protocol and (b) special key management. Especially, we try to address the following question: How strong of security properties...

Journal: :RFC 2010
J. William Atwood Salekul Islam Maziar Siami

RFC 4601 mandates the use of IPsec to ensure authentication of the link-local messages in the Protocol Independent Multicast Sparse Mode (PIM-SM) routing protocol. This document specifies mechanisms to authenticate the PIM-SM link-local messages using the IP security (IPsec) Encapsulating Security Payload (ESP) or (optionally) the Authentication Header (AH). It specifies optional mechanisms to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید