نتایج جستجو برای: rekeying
تعداد نتایج: 186 فیلتر نتایج به سال:
Abstract Here we delineate a complete satellite-based augmentation system (SBAS) authentication scheme, including over-the-air rekeying (OTAR), that uses the elliptic curve digital signature algorithm (ECDSA) and timed efficient stream loss-tolerant (TESLA) without quadrature (Q) channel. This scheme appends two new message types to SBAS scheduler over-burdening schedule. We have taken...
This paper presents a new hybrid group key management scheme for sensitive information systems which allows group members to share information securely. By classifying users into two categories, the complexities of rekeying operation on key servers are reduced while privacy for individuals is also protected. A formal analysis is provided to verify the efficiency and security of the proposed wor...
In secure group communications, a key server can deliver a ‘‘group-oriented’’ rekey message [C.K. Wong, M.G. Gouda, S.S. Lam, Secure group communications using key graphs, in: Proceedings of ACM SIGCOMM 98, September 1998, pp. 68–79] to a large number of users efficiently using multicast. For reliable delivery, Keystone [C.K. Wong, S.S. Lam, Keystone: a group key management system, in: Proceedi...
Many group key agreement protocols (GKA) for secure group communication (SGC) based on the Diffie-Hellman key exchange principle have been proposed in literature. All of these protocols require member serialization and/or existence of a central entity. In this paper, we propose a simple group Diffie-Hellman key agreement protocol which removes these two limitations. Moreover, the new protocol n...
Vehicular ad-hoc networks are obtained by applying important features of mobile ad hoc networks, in this application, it is not easy to preserve security and make this network private. Various attackers try to exploit VANETs and send forgery messages to deceive other vehicles which may lead harmful for driver/ passenger. To improve traffic safety and comfort of driving and travelling, it is req...
It is essential to provide authentication on mobile nodes in group communication to ensure security and privacy. The nodes that are interested in participating in the group communication form Graphs (V, E). In this paper we authenticate the mobile nodes through transitive closure property of the graph in the routing phase of the On Demand Multicast Routing Protocol (ODMRP) that forms Transitive...
Many medical systems are currently equipped with a large number of tiny, non-invasive sensors, located on, or close to, the patient’s body for health monitoring purposes. These groupings of sensors constitute a body sensor network (BSN). Key management is a fundamental service for medical BSN security. It provides and manages the cryptographic keys to enable essential security features such as ...
A mobile ad-hoc network is a self configure network with dynamic infrastructure. The mobile network is self formed and self healing network. In MANET mobile nodes are connected by means of Wi-Fi, satellite transmission, etc to form a mobile network. Multi-hop technique is used while sending messages from source to sink; it also reduces delay in packet transferring. The path keeps on changing du...
In secure multicast applications, key management must be employed to provide access control to the multicast content. In wireless networks, where the error rate is high and the bandwidth is limited, the design of key management schemes should place emphasis on reducing the communication burden associated with key updating and improving the reliability of key distribution. The topology-matching ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید