نتایج جستجو برای: group key management

تعداد نتایج: 2218760  

Journal: :EURASIP J. Wireless Comm. and Networking 2006
Win Aye Mohammad Umar Siddiqi

Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for ...

Journal: :JCIT 2010
Xianping Wu Huy Hoang Ngo Phu Dung Le Bala Srinivasan Huamei Qi

This paper presents a new hybrid group key management scheme for sensitive information systems which allows group members to share information securely. By classifying users into two categories, the complexities of rekeying operation on key servers are reduced while privacy for individuals is also protected. A formal analysis is provided to verify the efficiency and security of the proposed wor...

Journal: :CoRR 2012
Elina Eidkhani Melisa Hajyvahabzadeh S. Anahita Mortazavi Alireza Nemaney Pour

Recently, the number of requests for multicast services through the wireless networks has been increased. However, for successful deployment, security and efficiency of content delivery must be provided at first. This paper presents a new approach for secure multicast in wireless networks. This approach, CRAW (Combination of Re-keying and Authentication in Wireless networks) combines member aut...

Journal: :Comput. Sci. Inf. Syst. 2014
Inshil Doh Jiyoung Lim Shi Li Kijoon Chae

In the ubiquitous environment, more and more devices are deployed in our daily life, and need to communicate with one another. M2M (Machine-toMachine) communication is considered to be one of the major issues in future networks. M2M is expected to bring various benefits in wireless communications when it is interconnected with cellular networks. Considering the characteristics of cellular M2M n...

Journal: :IACR Cryptology ePrint Archive 2011
Shaohua Tang Jintai Ding Yujun Liang

A new fundamental and secure group key management approach with a group controller GC using the theory of polynomial functions over a vector space over finite field is developed, where each member in the group corresponds to a vector in the vector space and the GC computes a central vector, whose inner product with every member’s ID vector are identical. The central vector is published and each...

2005
Sencun Zhu Sushil Jajodia

Multicast is an efficient technique to distribute data to a large group of users. To prevent disclosure of distributed data to unauthorized users, multicast-based applications require confidential group communication, which is achieved by encrypting data with a group-wide shared key. The group key must be updated and redistributed to all authorized users in a secure and reliable fashion wheneve...

Journal: :J. Inf. Sci. Eng. 2006
Ganapathi Padmavathi Samukutty Annadurai

Multicast communication will be the communication paradigm of future networks. Secure multicasting is a challenging issue. The main objective of secure multicasting is to distribute the group key to the current members of the group in a scalable manner with minimum overheads. The key distribution methods can be either centralized or distributed. Of these, the centralized methods are simple and ...

2014
Bo Qin Linxiao Wang Yujue Wang Qianhong Wu Wenchang Shi Bin Liang

People need to communicate each other in many emerging networks, i.e., in ad hoc networks. To ensure the security for group communication, group key management as a fundamental cryptographic primitive has been proposed. Although many proposals with regard to group key managemet have been introduced, they cannot be efficiently applied to realize secure subgroup and intergroup communications. In ...

2012
Vibha Indira Gandhi Neha Bhatnagar Indira Gandhi Sakshi Gupta

In recent years, group-oriented applications and collaborative protocols are gaining popularity. This calls for group key management which forms the basic building block in achieving secure group communication. The points that differentiate it from the traditional communication are that they do not have a centralized server but a distributed system, group key being contributory and dynamic natu...

Journal: :CoRR 2005
Hideyuki Sakai Hirosuke Yamamoto

In key management schemes that realize secure multicast communications encrypted by group keys on a public network, tree structures are often used to update the group keys efficiently. Selçuk and Sidhu have proposed an efficient scheme which updates dynamically the tree structures based on the withdrawal probabilities of members. In this paper, it is shown that Selçuk-Sidhu scheme is asymptotic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید