A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Group rekeying with a customer perspective
Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004.
In secure multi-party communications, several solutions have been proposed to deal with group rekeying. ...
However, most of existing solutions including the most efficient ones still are severely lacking with respect to reliability and real customer expectations. ...
Conclusion Most of existing group rekeying solutions are severely lacking with respect to reliability and real customer expectations. ...
doi:10.1109/icpads.2004.1316099
fatcat:nvt6rhh7kzhybfkngwgxyslxtq
P3: Privacy Preservation Protocol for Automatic Appliance Control Application in Smart Grid
2014
IEEE Internet of Things Journal
Experimental results demonstrate that our protocol merely incurs a substantially light overhead on the AAC application, yet is able to address and solve the formidable privacy challenges both customers ...
Based on a set of existing cryptographic primitives, we propose an ABE key management variant and we also design and implement a finegrained protocol named Privacy Preservation Protocol (P3). ...
key of ABE number of smart meters in a group number of legal smart meters for group rekeying public key q order of and polynomial a random a random corresponding to an attribute j in ABE , random in group ...
doi:10.1109/jiot.2014.2358578
fatcat:nsmkndfdxzfc3oaxsraehheru4
Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid
2013
Smart Grid and Renewable Energy
Without appropriate privacy protection schemes, electricity customers are faced with various privacy risks. ...
In this paper, we propose a group key scheme to safeguard multicast privacy with the provisions of availability, fault-tolerance, and efficiency in the context of smart buildings as a part the smart grid ...
update where n is the group size. 2) Every sponsor should sign and forward a large number of rekeying multicast messages to update a group key. ...
doi:10.4236/sgre.2013.44038
fatcat:7vvxjkwxnzhjffle2uagzfowme
Decentralized Key Management Scheme Using Alternating Multilinear Forms for Cloud Data Sharing with Dynamic Multiprivileged Groups
2019
Mathematical Modelling and Engineering Problems
This paper proposes a Decentralized key management scheme using alternating multi linear forms for cloud data sharing with dynamic multi privileged groups. ...
This method is to divide large group into many subgroups, each sub group has a group manager. ...
Data confidentially: In one rekeying process, session keys are gotten from past session keys and a discretionary rekeying material when a client leaves/changes from a SG utilizing a confined limit with ...
doi:10.18280/mmep.060405
fatcat:tmevizoabbajdhx5mqomnfcy4y
No peeking: privacy-preserving demand response system in smart grids
2013
International Journal of Parallel, Emergent and Distributed Systems
Without a well-designed privacy preservation mechanism, adversaries can capture, model and divulge customers' behaviour and activities. ...
Unfortunately, privacy violation becomes a pressing challenge that drastically affects the DR programs. Power usage and operational data can be abused to infer personal information of customers. ...
From an adversary's perspective, we practically illustrate privacy threats with the aid of corresponding examples. ...
doi:10.1080/17445760.2013.851677
fatcat:35yoepckuzegfizbfgw3ujuaii
eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid
2015
2015 IEEE Trustcom/BigDataSE/ISPA
It is a key management scheme that can support unicast, multicast and broadcast communications based on an efficient Multi-group Key graph technique. ...
AMI is an enabling technology for Smart Grid (SG) and hence represents a privileged target for security attacks with potentially great damage against infrastructures and privacy. ...
An automatic verification of security with an automated validation tool like AVISPA is also in our perspectives. ...
doi:10.1109/trustcom.2015.447
dblp:conf/trustcom/BenmalekC15
fatcat:lopifppoyjf6rkxtopdzqlsycy
Predistribution and local collaboration-based group rekeying for wireless sensor networks
2009
Ad hoc networks
To address this problem, we propose a family of predistribution and local collaboration-based group rekeying (PCGR) schemes, which update the compromised group keys to prevent the compromised nodes from ...
To the best of our knowledge, our schemes are the first set of distributed group rekeying schemes for sensor networks without involving online key servers. ...
We also compare the performance of the proposed schemes with several existing group rekeying schemes. ...
doi:10.1016/j.adhoc.2008.11.004
fatcat:7nulgkqbf5du5k53try7cxdgla
Impacts of S1 and X2 Interfaces on eMBMS Handover Failure: Solution and Performance Analysis
2018
IEEE Transactions on Vehicular Technology
In this paper, we point out a new handover failure problem in eMBMS due to the miss of rekeying information. We first take a close look at the new handover scenarios. ...
Moreover, we propose a solution to combat against the handover failure. ...
When a member joins/leaves the group, a group key needs to be updated to add/revoke the member. The process is referred to as rekeying. ...
doi:10.1109/tvt.2018.2812858
fatcat:dmdlar35tramfomtqab6eivacm
Efficient Auditing Scheme for Secure Data Storage in Fog to Cloud Computing
2022
Zenodo
Fog-to-cloud computing has now become a new cutting-edge technique along with the rapid popularity of Internet of Things (IoT). ...
By implementing MAC and HMAC, we give a concrete instantiation of our auditing system. ...
Registration and Encryption ➢ Database Storage ➢ Group Key Generation within the workgroup ➢ Keying and rekeying the group key ➢ Sharing the data within workgroup Registration and Encryption: ...
doi:10.5281/zenodo.6397125
fatcat:zqxv6ojsivcyxgjognek7gm5fe
Introduction to Section 4
[chapter]
2020
Lived Religion in the Ancient Mediterranean World
The reader is confronted with a deliberately puzzling chain of connections that draws the origins of the squalor, a custom that had become conventional by Claudius' time, back to the founding myth of the ...
of a specific group" (Albrecht et al. 2018, 584) . ...
doi:10.1515/9783110557596-021
fatcat:z7lhqn3trbd6vlnakfhrwqmbh4
On replacing cryptographic keys in hierarchical key management systems
2008
Journal of Computer Security
Each group is assigned a single cryptographic key that is used for encryption/decryption. ...
Data re-encryption is time-consuming, so, rekeying creates delays that impede performance. ...
Results for each case are obtained from averages of over 10 runs, with random numbers of rekey requests expressed as proportions of a user group with a maximum of 100 members and files (versions of the ...
doi:10.3233/jcs-2008-16303
fatcat:3usm2iiw5bevngv6sdhlem5tyq
Toward live domain-specific languages
2017
Journal of Software and Systems Modeling
In other words, unlike in our setting, HUTN provides a fixed concrete syntax with fixed scoping rules. TMDIFF allows languages to have custom syntax, and custom binding semantics. ...
First the machine is extended with a locked state in Doors 2 (Fig. 4a ). Second, Doors 3 (Fig. 4b ), shows a grouping feature of the language: the locked state is part of the locking group. ...
doi:10.1007/s10270-017-0608-7
fatcat:rxwnoke35rbhbey24x6imqqnyi
A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters
2020
USENIX Security Symposium
In particular, it involves various mechanisms that interact with each other in subtle ways, which offers little hope for modular reasoning. ...
Our model is the first that is detailed enough to detect the KRACK attacks; it includes mechanisms such as the four-way handshake, the group-key handshake, WNM sleep mode, the dataconfidentiality protocol ...
A rekey of the group temporal key can involve a new iteration of the four-way handshake with one supplicant (the one who initiated the rekey) and socalled group-key handshakes with the other supplicants ...
dblp:conf/uss/CremersKM20
fatcat:qqrva2r5mzfaldyp6yny2ddts4
Keying Methods of using Protocols for Cryptography in Wireless Networks
2019
International Journal of Engineering and Advanced Technology
The rekeying convention understands customer express statistics, as an example, region records as a key seed. This gadget consists of operational modes. ...
be obliged remote sensor systems, wherein as it has a few detainment in asset use. ...
The sending module handles the path in the direction of sending and suffering of encoded groups while in motion to the sink.
A. ...
doi:10.35940/ijeat.f1186.0886s219
fatcat:sj7j2p2qvnd4ppbas4y42zjelm
Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey
[article]
2018
arXiv
pre-print
We also provide a classification of the existing works in literature that deal with secure key management system in AMI. Finally, we identify possible future research directions of KMS in AMI. ...
Thus, AMI plays a significant role in the smooth functioning of smart grids. AMI is a privileged target for security attacks as it is made up of systems that are highly vulnerable to such attacks. ...
The scheme is based on a multi-group key graph structure that supports the management of multiple demand response projects concurrently for every customer. ...
arXiv:1806.00121v1
fatcat:kbbuv36djnby3i4rlm4fapw2ja
« Previous
Showing results 1 — 15 out of 295 results