نتایج جستجو برای: rekeying

تعداد نتایج: 186  

2010
Attila A. YAVUZ Fatih ALAGÖZ Emin ANARIM

Mobile Ad-hoc NETworks (MANETs) are expected to play an important role in tactical military networks by providing infrastructureless communication. However, maintaining secure and instant information sharing is a difficult task especially for highly dynamic military MANETs. To address this requirement, we propose a new multi-tier adaptive military MANET security protocol using hybrid cryptograp...

2002
Patrick P. C. Lee John C. S. Lui David K. Y. Yau

We consider several distributed collaborative key agreement protocols for dynamic peer groups. This problem has several important characteristics which make it different from traditional secure group communication. They are (1) distributed nature in which there is no centralized key server, (2) collaborative nature in which the group key is contributory; i.e., each group member will collaborati...

Journal: :IACR Cryptology ePrint Archive 2012
Will Landecker Thomas Shrimpton R. Seth Terashima

Liskov, Rivest and Wagner formalized the tweakable blockcipher (TBC) primitive at CRYPTO’02. The typical recipe for instantiating a TBC is to start with a blockcipher, and then build up a construction that admits a tweak. Almost all such constructions enjoy provable security only to the birthday bound, and the one that does achieve security beyond the birthday bound (due to Minematsu) severely ...

2013
R. Sharmila P. C. Gopi Dr. V. Vijayalakshmi

In near future, the Wireless Sensor Networks (WSN) is widely used in many applications like military and civil domains. The wireless sensor networks are always deployed in hostile and pervasive environment. Security is major concern in the wireless sensor network. The traditional network security methods are not suitable for wireless sensor networks because of limited resource. Several Key mana...

Journal: :EURASIP J. Wireless Comm. and Networking 2006
Win Aye Mohammad Umar Siddiqi

Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for ...

2002
Bin Sun Wade Trappe Yan Sun K. J. Ray Liu

Group-oriented services are attractive to both customers and service providers since they allow for potential markets that exploit user collaboration and shared experiences. In order to protect the content of a group service, the content must be encrypted using a key shared by group members. With the advancement of network technologies, customers will access group services from different networ...

Journal: :JCM 2011
Manel Boujelben Habib Youssef Rania Mzid Mohamed Abid

Wireless sensor networks applications are growing and so are their security needs. However, due to severe memory, computing and communication limitations, wireless sensor networks security presents tremendous challenges. Central to any security service, key management is a fundamental cryptographic primitive to provide other security operations. In this paper, we propose IKM, an identity based ...

Journal: :Ad Hoc Networks 2014
Massimiliano Albanese Alessandra De Benedictis Sushil Jajodia Don J. Torrieri

Cyber Maneuver is envisioned as a way of increasing the robustness of imperfect systems by creating and deploying mechanisms that continually change a system’s attack surface. A particularly useful strategy against jamming attacks in Mobile Ad Hoc Networks (MANETs) entails using cyber-maneuver keys to supplement higher-level cryptographic keys. Such keys can be periodically changed either in a ...

Journal: :JNW 2008
Sen Xu Chin-Tser Huang Manton M. Matthews

Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because many applications require access control and privacy. This issue is more sensitive to wireless network, which is lack of physical boundaries. IEEE 802.16 is the standard for next generation wireless network, which aims to provid...

2012
V.Jaya Ramakrishna K.Nithin

we consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. They are: 1) distributed nature in which there is no centralized key server; 2) collaborative nature in which the group key is contributory (i.e., each group me...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید