نتایج جستجو برای: rekeying

تعداد نتایج: 186  

2011
S. Bhargavi

This paper deals with Designing cost-efficient, secure network protocols for any Networks is a challenging problem because node in a network itself is resource-limited. Since the communication cost is the most dominant factor in any network, we introduce an energy-efficient Node Energy-Based Encryption and Keying (NEBEK) scheme that significantly reduces the number of transmissions needed for r...

Journal: :Computer Communications 2007
Guojun Wang Jie Ouyang Hsiao-Hwa Chen Minyi Guo

Multi-privileged group communications containing multiple data streams have been studied in the traditional wired network environment and the Internet. With the rapid development of mobile and wireless networks and in particular mobile ad-hoc networks (MANETs), the traditional Internet has been integrated with mobile and wireless networks to form the mobile Internet. The multi-privileged group ...

Journal: :I. J. Network Security 2008
Hwa Young Um Edward J. Delp

In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the receiving and transmitting ends. Mobility is one of the most distinct features to be considered in wireless networks. Moving users onto the key tree causes extra key management resources even though they are still in s...

2013
Aditya Shukla Anurag Pandey Saurabh Srivastava

Since the secure communication for Wireless Sensor Network (WSNs) is a challenging problem because sensors are resources limited and cost is the most dominant factor in a energy consumption, for this we introduce an energy-efficient Virtual Energy-Based Encryption and Keying(VEBEK) scheme for WSNs that reduces the number of transmission needed for rekeying the packets. VEBEK is a secure communi...

2015
D. Saravanan

---This paper is about the Group Key(GK) which is shared only by a group of mobile devices. This paper explains a new Group Key Management framework for the environment with dynamic mobile subscribers. Group key management plays very efficient and necessary role in mobile communication for enabling access control.The big thing is how to minimize the communication cost for generating rekeying am...

2010
Valli Kumari D. V. Naga Raju G. H. Chiou C. K. Wong B. DeCleene L. Dondeti S. Griffin T. Hardjono

Maintaining security is a critical issue in any group communication protocols. The objective of security in a group communication is to ensure the access only to the legitimate members of the multicast group. The entry and eviction of the members are the main criteria to change the group key and to give them more assurance of a secret communication, which is known as re-keying. Since it is a fr...

2005
Darshan Purandare Ratan K. Guha

The Wired Equivalent Privacy (WEP) protocol for networks based on 802.11 standards has been shown to have several security flaws. In this paper we have proposed a modification to the existing WEP protocol to make it more secure. We also develop an IV avoidance algorithm that eliminates Initialization Vector (IV) collision problem by assigning unique pattern of IV bits to each node. We achieve M...

2013

As insurers face tremendous pressure to improve their financial performance amid rough global economic weather, efficient risk selection and accurate pricing have become even more critical. However, most commercial insurers go about these processes in a haphazard, labor-intensive and nonstandardized manner. Underwriters spend an unjustifiable amount of time dealing with unclear workflows, lack ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید