نتایج جستجو برای: rekeying

تعداد نتایج: 186  

Journal: :I. J. Network Security 2014
Wei Teng Li Chung-Huei Ling Min-Shiang Hwang

Wireless sensor networks (WSNs) consist of many small sensor nodes and are commonly used to collect data and monitor hostile environments. Due to the factor of the cost, sensor nodes are lack of tamper-resistance and are deployed in unattended environments. Sensor nodes are easily captured by an intruder and compromised. An intruder will extract the secret elements in the sensor nodes including...

Journal: :Information Technology Journal 2008

Journal: :Comput. J. 2013
Gianluca Dini Marco Tiloca

Group communication is a suitable and effective communication model for large-scale distributed systems.To be fully exploitable, group communication must be protected.This is normally achieved by providing members with a group key which is revoked and redistributed upon every member’s joining (backward security) or leaving (forward security). Such a rekeying process must be efficient and highly...

2003
Sandeep KULKARNI Bezawada BRUHADESHWAR

In this paper, we focus on the problem of secure multicast in dynamic groups. In this problem, a group of users communicate using a shared group key. Due to the dynamic nature of these groups, to preserve secrecy, it is necessary to change the group key whenever the group membership changes. While the group key is being changed, the group communication needs to be interrupted until the rekeying...

Journal: :I. J. Network Security 2008
Depeng Li Srinivas Sampalli

We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman technique for group key updates. It combines the advantage of the centralized approach’s efficiency and the contributory scheme’s fault tolerance. In addition, our rekeying algorithm updates the group key in the prese...

Journal: :JoWUA 2015
N. Renugadevi C. Mala

Cognitive radio based networks can resolve the spectrum scarcity issues present in the current emergency communication networks. Establishing quick and secure communication between rescue team members in the disaster field is a significant task and cognitive radio MANETs are the best choice for disaster management and other emergency situations. This paper presents a scalable group key agreemen...

Journal: :ICTACT Journal on Communication Technology 2018

2002
Sandeep S. Kulkarni Bezawada Bruhadeshwar

In this paper, we focus on the problem of secure multicast in dynamic groups. In this problem, a group of users communicate using a shared key. Due to the dynamic nature of these groups, to preserve secrecy, it is necessary to change the group key whenever the group membership changes. While the group key is being changed, the group communication needs to be interrupted until the rekeying is co...

2017
Bart Mennink

Two types of tweakable blockciphers based on classical blockciphers have been presented over the last years: non-tweak-rekeyable and tweak-rekeyable, depending on whether the tweak may influence the key input to the underlying blockcipher. In the former direction, the best possible security is conjectured to be 2, where n is the size of the blockcipher and σ is the number of blockcipher calls. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید