نتایج جستجو برای: toppling free fall shearing key group method
تعداد نتایج: 3355041 فیلتر نتایج به سال:
A wireless sensor network is a collection of devices limited in lowpowered batteries, processing, communication bandwidth capabilities and low memory availability. Due to these constraints, most of security approaches used in wired networks cannot be applied directly in this environment. In this work, we present a hybrid protocol that treats the group key management scheme and the transparent c...
Recently, Isalam and Biswas proposed a new group key agreement (GKA) protocol for imbalanced mobile networks. In this letter, we will show that Isalam et al.’s GKA protocol is not secure.
This paper studies the security of the trusted center in a b-secure t-group key distribution scheme in which the center issues a private information vi 2 V to each user i based on the center secret s 2 S. User i can obtain the common key k 2 K with t ? 1 other users from vi so that any dishonest b users cannot learn any key they should not know. First, we show how to distribute the power of the...
In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way. We provide security proofs against passive attacks and suitable examples that may enhance both the security level and communication overheads of previous existing protocols.
In a group key exchange protocol, the resulting group key should be computed by all participants such that none of them can gain any advantage concerning the protocol’s output: misbehaving participants might have personal advantage in influencing the final value of the key. In fact, the absence of trust relationship is the main feature of group key exchange (when compared to group key transport...
Secure group communication is an active area of research and its popularity is fuelled by the growing importance of group-oriented applications such as teleconferences, collaborative workspace, pay per-view etc. A number of group key agreement protocols have been proposed for these objectives. However most of the protocols have not considers the anonymity of the participants. Although in some a...
Group key management is an important functional building block for any secure multicast architecture. Thereby, it has been extensively studied in the literature. In this paper we present relevant group key management protocols. Then, we compare them against some pertinent performance criteria. Keywords—Multicast, Security, Group Key Management.
Multicasting has been widely utilized for delivering messages from one sender to multiple recipients. Nowadays in some applications such as pay per view or videoconferencing systems, the messages delivered via multicasting should be available to authorized recipients only. Therefore, secure multicasting becomes an important design issue in distributed environment. To achieve secure multicasting...
Recently, in Journal of Security and Communication Networks (5(12):1363-1374, DOI: 10.1002/ sec.429), Wang et al. proposed a group key distribution scheme with self-healing property for wireless networks in which resource is constrained. They claimed that their key distribution scheme satisfies forward security, backward security and can resist collusion attack. Unfortunately, we found some sec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید