Filters








19 Hits in 5.3 sec

Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid

Depeng Li, Zeyar Aung, Srinivas Sampalli, John Williams, Abel Sanchez
2013 Smart Grid and Renewable Energy  
In this paper, we propose a group key scheme to safeguard multicast privacy with the provisions of availability, fault-tolerance, and efficiency in the context of smart buildings as a part the smart grid  ...  In addition, an individual rekeying scheme is introduced for occasional joining and leaving of member smart meters.  ...  point failures; 5) Most importantly, a couple of novel rekeying algorithms e.g. the child key tree, the fixed key tree, etc. are proposed, designed and implemented for rekeying schemes in practice; 6)  ... 
doi:10.4236/sgre.2013.44038 fatcat:7vvxjkwxnzhjffle2uagzfowme

Engineering multicast group key distribution: a review

C. Vidakis, M. Fleury
2005 IEE Proceedings - Software  
For example, if each group member was initialised with their own Key for Encrypting a group Key, a KEK, then in a centralized scheme a single message could be multicast containing multiple copies of the  ...  The two multicast group key management research forums 2 [21][22], assuming centralized key management, have focused on: policy matters -how access to the group is authorized and authenticated, and how  ...  Some security weaknesses of Clique schemes (Section 5.2) have been reported. Kronos [18] is a novel approach to scalable group re-keying for secure multicast.  ... 
doi:10.1049/ip-sen:20045069 fatcat:jdcdgz7uu5hy5hi75erv2f7nl4

Security Architecture for Sensitive Information Systems [chapter]

Xianping Wu, Phu Dung, Balasubramaniam Srinivas
2010 Convergence and Hybrid Information Technologies  
The proposed dynamic key management provide stronger security than other existing approaches in sensitive information protection, and comparable with communication channel (unicast and multicast), user  ...  Distributing very long one-time pad keys is inconvenient and usually poses a significant security risk.  ...  Therefore, in this section, we apply dynamic keys theory to propose a novel security architecture.  ... 
doi:10.5772/9641 fatcat:cdq2t26wcfc3vc5czgqog3h5pu

Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings

Adhirath Kabra, Sumit Kumar, Gaurav Kasbekar
2018 EAI Endorsed Transactions on Internet of Things  
Classical Group Key Management (GKM) schemes perform inefficiently in dynamic IoT environments, wherein nodes frequently leave or join a network or migrate from one group to another.  ...  In this paper, we present a highly efficient and secure GKM protocol for dynamic IoT settings, which maintains forward and backward secrecy at all times and is completely resistant to collusion attacks  ...  In [6] , the authors proposed a novel batch based centralized approach to efficiently manage group keys in generic ad hoc networks, while limiting the computational and communication costs due to group  ... 
doi:10.4108/eai.3-3-2021.168862 fatcat:dk7si3q4vrhlvnnzj6lkqgwezi

Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings [article]

Adhirath Kabra, Sumit Kumar, Gaurav S. Kasbekar
2020 arXiv   pre-print
Group Key Management (GKM) involves the handling, revocation, updation and distribution of cryptographic keys to members of various groups.  ...  In this paper, we present a highly efficient and secure GKM protocol for dynamic IoT settings, which maintains forward and backward secrecy at all times.  ...  In [6] , the authors proposed a novel batch based centralized approach to efficiently manage group keys in generic ad hoc networks, while limiting the computational and communication costs due to group  ... 
arXiv:2008.06890v1 fatcat:z2cwjgmzt5a5ro3ubofz4gjazu

Multimedia Internet of Things: A Comprehensive Survey

Ali Nauman, Yazdan Ahmad Qadri, Muhammad Amjad, Yousaf Bin Zikria, Muhammad Khalil Afzal, Sung Won Kim
2020 IEEE Access  
Various multimedia applications supported by IoT are surveyed, and numerous use cases related to road traffic management, security, industry, and health are illustrated to show how different M-IoT applications  ...  This paper provides a comprehensive survey of M-IoT with an emphasis on architecture, protocols, and applications. This article starts by providing a horizontal overview of the IoT.  ...  Batch rekeying accommodates multiple multimedia applications based on periodic batch keying, periodic batch leave keying, and periodic batch join rekeying [74] .  ... 
doi:10.1109/access.2020.2964280 fatcat:ilihkpik65bdvblyal6rp7tb2y

A Comprehensive Survey on VANET Security Services in Traffic Management System

Muhammad Sameer Sheikh, Jun Liang
2019 Wireless Communications and Mobile Computing  
In this paper, we summarize the recent state-of-the-art methods of VANETs by discussing their architecture, security, and challenges.  ...  Secondly, we discuss the detailed analysis of security schemes and the possible measures to provide secure communication in VANETs.  ...  [127] presented a RSU-based decentralized key management (RDKM) which is used only for multicast services in VC systems. is scheme reduced the large amount of rekeying overhead by contributing some  ... 
doi:10.1155/2019/2423915 fatcat:4dool3bba5ea7h6muysjtzpxfq

A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs)

Sheikh, Liang, Wang
2019 Sensors  
In this survey, we discussed the basic overview of the VANET from the architecture, communication methods, standards, characteristics, and VANET security services.  ...  Vehicular ad hoc networks (VANETs) are an emerging type of mobile ad hoc networks (MANETs) with robust applications in intelligent traffic management systems.  ...  [148] presented an RSU-based decentralized key management (RDKM), which is used only for multicast services in vehicle communication (VC) systems.  ... 
doi:10.3390/s19163589 fatcat:gh4aysf2l5ecjbq7xh5nr3wpx4

A Survey on M2M Service Networks

Juhani Latvakoski, Antti Iivari, Paul Vitic, Bashar Jubeh, Mahdi Alaya, Thierry Monteil, Yoann Lopez, Guillermo Talavera, Javier Gonzalez, Niclas Granqvist, Monir Kellil, Herve Ganem (+1 others)
2014 Computers  
It is assumed here that the referred challenge is so fundamental that it requires novel approaches for the system architectures and application of novel paradigms.  ...  Another motivation for overlay networking arises from security challenges.  ...  and multicast service (MBMS) -Generic Bootstrapping Architecture (GBA) -Key establishment mechanisms -Ongoing: security for system improvement for machine-type communications -Lawful interception  ... 
doi:10.3390/computers3040130 fatcat:74vq35r6jjd27oubdpze7ef4e4

Heuristic Algorithm for Efficient Data Retrieval Scheduling in the Multichannel Wireless Broadcast Environments

A. Porselvi, S.Brindha Devi
2015 International Journal of Computer Applications Technology and Research  
We propose a novel 'secure attribute based system with short ciphertext' scheme with constantsize decryption keys independent of the number of attributes.  ...  A Security use of decryption with decryption key stored in RFID tags embedded within ID cards.  ...  key management protocol to optimize key management for a user with multiple options  ... 
doi:10.7753/ijcatr0405.1001 fatcat:7xpnnpep5vd7hcrmcjr4fvpnq4

Security architecture for sensitive information systems

Xianping Wu
2017
The research described in this thesis is based on dynamic key theory and group key theory to present a novel security architecture to enable sensitive information systems to overcome these challenges and  ...  The proposed security architecture consists of dynamic key management, user-oriented group key management, authentication and authorization management and sensitive information management, which guarantee  ...  Therefore, in this section, we apply dynamic keys theory to propose a novel security architecture.  ... 
doi:10.4225/03/587819f31a8b6 fatcat:p5xlru3rvnh47giifhmoucgxx4

Dynamic group-based authentication in wireless networks

Huy Hoang Ngo
2017
The derived architecture has two layers: the key management layer and the authentication layer.  ...  A good authentication model for wireless network users and services thus needs to have four desirable properties: security, efficiency, scalability and flexibility.  ...  Chapter 3 presents a novel authentication model for wireless network users and services and an authentication architecture.  ... 
doi:10.4225/03/5878532b57d3f fatcat:arsf224qqjdazl74krsiihwj2q

Public-Key Infrastructure [chapter]

2013 Wireless Mobile Internet Security  
Nevertheless, constructing effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services remains both a technological and  ...  In response to the EuroPKI 2008 call for papers, a total of 37 paper proposals were received.  ...  The BBN RPKI software was written by Charlie Gardiner, Joshua Gruenspecht, Marla Shepard, Peiter "mudge" Zatko, and the authors, under the management of Karen Seo.  ... 
doi:10.1002/9781118512920.ch7 fatcat:hocfzfhi4rbuhmssop2hkwbc64

Key Management Scheme for Smart Grid

B Alohali
2016
This process is also known as rekeying, and is grouped into either individual rekey or periodical batch rekey.  ...  The former rekeys the group key for every group membership update such as joining /leaving. The latter processes the joining and leaving requests in a batch at the end of each rekey interval.  ...  This is of concern from a security perspective.  ... 
doi:10.24377/ljmu.t.00005042 fatcat:pnxvi6czszg47i6wmgyrftl2qe

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+97 others)
2016 International Journal of Network Security   unpublished
Then a new PPS authenticated key agreement protocol is given based on chaotic maps. Security of the scheme is based on chaotic maps hard problems and a secure one way hash function.  ...  Most of the privacy-protection schemes adopting chaotic maps are usually by symmetric cryptography for guaranteeing identity hiding. This will lead to a high calculated amount.  ...  Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments. Acknowledgments  ... 
fatcat:3gborlznmrac3ebiwzxjjy5jly
« Previous Showing results 1 — 15 out of 19 results