نتایج جستجو برای: rekeying

تعداد نتایج: 186  

2004
Jun Zhang Fanyuan Ma Yingcai Bai Minglu Li

The efficiency of rekeying is a main factor that influences the performance of secure group communications. Periodic batch rekeying for users join/leave is an effective way to improve the efficiency of rekeying. In this paper, we introduce queue theory into the batch rekey algorithm, and construct a model of batch rekey algorithm based on the queue theory. We then analyze the performance influe...

2014
Yang Xu Wei Zhou Guo-Jun Wang

Key management becomes more difficult in multi-privileged communications due to the dynamic membership and the complex relations between users and resources. In this paper, we propose a novel key management scheme in which the key graph is based on multiway trees. Chinese remainder theorem is employed to combine some encrypted rekeying materials into a short message for rekeying. As a result, u...

2005
Sandeep S. Kulkarni Bezawada Bruhadeshwar

In this paper, we focus on tradeoffs between storage cost and rekeying cost for secure multicast. Specifically, we present a family of algorithms that provide a tradeoff between the number of keys maintained by users and the time required for rekeying due to revocation of multiple users. We show that some well known algorithms in the literature are members of this family. We show that algorithm...

2003
Refik Molva

Even though multicast rekeying is one of the most visited areas in network security, solutions still are severely lacking with respect to reliability and real customer expectations. Since any rekeying operation causes the update of all members’ keying material, long-lived members are strongly affected by frequent membership changes. In this paper, we suggest a new approach that takes into accou...

2012
Viji Vinod

Nowadays networks require flexible dynamic group communication with the internet. When we develop these systems on multicast communication framework, various types of security threat occurs .As a result construction of secure group communication that protects users from intrusion and eavesdropping are very important. In this paper, we propose an efficient key distribution method for a secure gr...

Journal: :IEEE Trans. Multimedia 2003
Wade Trappe Jie Song Radha Poovendran K. J. Ray Liu

The problem of controlling access to multimedia multicasts requires the distribution and maintenance of keying information. Typically, the problem of key management is considered separately from the problem of distributing the rekeying messages. Multimedia sources provide two approaches to distributing the rekeying messages associated with securing group communication. The first, and more conve...

Journal: :Wireless Networks 2008
Jin-Hee Cho Ing-Ray Chen Mohamed Eltoweissy

Advances in wireless communications and 5 mobile computing have led to the emergence of group 6 communications and applications over wireless. In many of 7 these group interactions, new members can join and current 8 members can leave at any time, and existing members 9 must communicate securely to achieve application-specific 10 missions or network-specific functionality. Since wireless 11 net...

Journal: :Wireless Networks 2010
Jin-Hee Cho Ing-Ray Chen

We investigate performance characteristics of secure group communication systems (GCSs) in mobile ad hoc networks that employ intrusion detection techniques for dealing with insider attacks tightly coupled with rekeying techniques for dealing with outsider attacks. The objective is to identify optimal settings including the best intrusion detection interval and the best batch rekey interval und...

Journal: :IJCNIS 2014
Adnan Shahid Khan

In mobile multihop relay (MMR) networks, Relay multicast rekeying algorithm (RMRA) is meant to ensure secure multicast communication and selective updating of keys in MMR networks. However, in RMRA, the rekeying is carried out after a specific interval of time, which cannot ensure the security for multicast communication on joining the member. Secondly, the rekeying scheme generates a huge comm...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید