نتایج جستجو برای: rekeying

تعداد نتایج: 186  

Journal: :Navigation: journal of the Institute of Navigation 2023

Abstract Here we delineate a complete satellite-based augmentation system (SBAS) authentication scheme, including over-the-air rekeying (OTAR), that uses the elliptic curve digital signature algorithm (ECDSA) and timed efficient stream loss-tolerant (TESLA) without quadrature (Q) channel. This scheme appends two new message types to SBAS scheduler over-burdening schedule. We have taken...

Journal: :JCIT 2010
Xianping Wu Huy Hoang Ngo Phu Dung Le Bala Srinivasan Huamei Qi

This paper presents a new hybrid group key management scheme for sensitive information systems which allows group members to share information securely. By classifying users into two categories, the complexities of rekeying operation on key servers are reduced while privacy for individuals is also protected. A formal analysis is provided to verify the efficiency and security of the proposed wor...

2004
Brian Zhang Simon S. Lam Dong-Young Lee

In secure group communications, a key server can deliver a ‘‘group-oriented’’ rekey message [C.K. Wong, M.G. Gouda, S.S. Lam, Secure group communications using key graphs, in: Proceedings of ACM SIGCOMM 98, September 1998, pp. 68–79] to a large number of users efficiently using multicast. For reliable delivery, Keystone [C.K. Wong, S.S. Lam, Keystone: a group key management system, in: Proceedi...

2004
Xukai Zou Byrav Ramamurthy

Many group key agreement protocols (GKA) for secure group communication (SGC) based on the Diffie-Hellman key exchange principle have been proposed in literature. All of these protocols require member serialization and/or existence of a central entity. In this paper, we propose a simple group Diffie-Hellman key agreement protocol which removes these two limitations. Moreover, the new protocol n...

2016
Raju Barskar Meenu Chawla

Vehicular ad-hoc networks are obtained by applying important features of mobile ad hoc networks, in this application, it is not easy to preserve security and make this network private. Various attackers try to exploit VANETs and send forgery messages to deceive other vehicles which may lead harmful for driver/ passenger. To improve traffic safety and comfort of driving and travelling, it is req...

2013
B. Gopalakrishnan A. Shanmugam

It is essential to provide authentication on mobile nodes in group communication to ensure security and privacy. The nodes that are interested in participating in the group communication form Graphs (V, E). In this paper we authenticate the mobile nodes through transitive closure property of the graph in the routing phase of the On Demand Multicast Routing Protocol (ODMRP) that forms Transitive...

2011
Mohamed Hamdy Eldefrawy Muhammad Khurram Khan Khaled Alghathbar Ahmed Saleh Tolba Kyngn Jung Kim

Many medical systems are currently equipped with a large number of tiny, non-invasive sensors, located on, or close to, the patient’s body for health monitoring purposes. These groupings of sensors constitute a body sensor network (BSN). Key management is a fundamental service for medical BSN security. It provides and manages the cryptographic keys to enable essential security features such as ...

2015
C. Shanmuganathan P. Raviraj

A mobile ad-hoc network is a self configure network with dynamic infrastructure. The mobile network is self formed and self healing network. In MANET mobile nodes are connected by means of Wi-Fi, satellite transmission, etc to form a mobile network. Multi-hop technique is used while sending messages from source to sink; it also reduces delay in packet transferring. The path keeps on changing du...

2003
Yan Sun Wade Trappe K. J. Ray Liu

In secure multicast applications, key management must be employed to provide access control to the multicast content. In wireless networks, where the error rate is high and the bandwidth is limited, the design of key management schemes should place emphasis on reducing the communication burden associated with key updating and improving the reliability of key distribution. The topology-matching ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید