نتایج جستجو برای: group key management

تعداد نتایج: 2218760  

Journal: :Trans. Data Privacy 2014
Mohamed Nabeel Elisa Bertino

Attribute based systems enable fine-grained access control among a group of users each identified by a set of attributes. Secure collaborative applications need such flexible attribute based systems for managing and distributing group keys. However, current group key management schemes are not well designed to manage group keys based on the attributes of the group members. In this paper, we pro...

Journal: :I. J. Network Security 2008
Mohamed Salah Bouassida Isabelle Chrisment Olivier Festor

Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of security to these services is the provision of a key management protocol. This paper shows the specific challenges towards key management protocols for securing multicast communications in ad hoc networks, and provide...

2007
Rakesh Bobba Himanshu Khurana

Decentralized group key management schemes for supporting secure group communication systems have been studied in the two flavors of contributory key agreement and decentralized key distribution. However, the primary focus has been on the former because the latter have been criticized for additional overheads of establishing secure channels and for the possibility of weak keys produced by the g...

Journal: :Ad Hoc Networks 2013
Luca Veltri Simone Cirani Stefano Busanelli Gianluigi Ferrari

1570-8705/$ see front matter 2013 Elsevier B.V. All rights reserved. http://dx.doi.org/10.1016/j.adhoc.2013.05.009 ⇑ Corresponding author. E-mail addresses: [email protected] (L. Veltri), simone.cirani@unipr. it (S. Cirani), [email protected] (S. Busanelli), gianluigi. [email protected] (G. Ferrari). 1 Iolus [6] for example, is a scheme that interferes with the packet stream, si...

2010
Yan Sun Wade Trappe

This book gives an introduction to group key management protocols in different network settings. It can be recommended to early researchers in the areas of group key management, secure multicast and secure communication in sensor networks. The book discusses various security issues in group communications in a network-aware approach. However, it fails to show how to rigorously analyze group key...

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Graham Steel Alan Bundy

This paper describes the modelling of a two multicast group key management protocols in a first-order inductive model, and the discovery of previously unknown attacks on them by the automated inductive counterexample finder CORAL. These kinds of protocols had not been analysed in a scenario with an active intruder before. CORAL proved to be a suitable tool for a job because, unlike most automat...

Journal: :Wireless Personal Communications 2010
Ju-Hyung Son Jun-Sik Lee Seung-Woo Seo

A sensor network operating in open environments requires a network-wide group key for confidentiality of exchanged messages between sensor nodes. When a node behaves abnormally due to its malfunction or a compromise attack by adversaries, the central sink node should update the group key of other nodes. The major concern of this group key update procedure will be the multi-hop communication ove...

2005
Min Yan

Our project will focus on real time system with constraints on security, real-time performance and limited resource. It is the seeking for performance optimization after a trade of all the constraints considered. Namely, we will cover the following areas: (a) Secure wireless communication in MANETs (b) Scalable and lightweight secure group communication, including authentication of group member...

2001
Ghassan Chaddoud Isabelle Chrisment André Schaff

I f multicast communication appears as the most eficient way to send data to a group of participants, it presents also more vulnerabilities to attacks and requires services such as authentication, integrity and confidentiality to transport data securely. In this papel; we present the protocol Baal’ as a scalable solution to group key inanagement problems and show how Baal resolves the user’s re...

Journal: :IJSN 2009
Bing Wu Jie Wu Yuhong Dong

Group key management is one of the basic building blocks in collaborative and group-orientedapplications inMobileAdHocNetworks (MANETs).Groupkey establishment involves creating and distributing a common secret for all group members. However, key management for a large and dynamic group is a difficult problem because of scalability and security.Modification ofmembership requires the groupkey to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید