295 Hits in 3.3 sec

Group rekeying with a customer perspective

M. Onen, R. Molva
Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004.  
In secure multi-party communications, several solutions have been proposed to deal with group rekeying.  ...  However, most of existing solutions including the most efficient ones still are severely lacking with respect to reliability and real customer expectations.  ...  Conclusion Most of existing group rekeying solutions are severely lacking with respect to reliability and real customer expectations.  ... 
doi:10.1109/icpads.2004.1316099 fatcat:nvt6rhh7kzhybfkngwgxyslxtq

P3: Privacy Preservation Protocol for Automatic Appliance Control Application in Smart Grid

Depeng Li, Zeyar Aung, John Williams, Abel Sanchez
2014 IEEE Internet of Things Journal  
Experimental results demonstrate that our protocol merely incurs a substantially light overhead on the AAC application, yet is able to address and solve the formidable privacy challenges both customers  ...  Based on a set of existing cryptographic primitives, we propose an ABE key management variant and we also design and implement a finegrained protocol named Privacy Preservation Protocol (P3).  ...  key of ABE number of smart meters in a group number of legal smart meters for group rekeying public key q order of and polynomial a random a random corresponding to an attribute j in ABE , random in group  ... 
doi:10.1109/jiot.2014.2358578 fatcat:nsmkndfdxzfc3oaxsraehheru4

Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid

Depeng Li, Zeyar Aung, Srinivas Sampalli, John Williams, Abel Sanchez
2013 Smart Grid and Renewable Energy  
Without appropriate privacy protection schemes, electricity customers are faced with various privacy risks.  ...  In this paper, we propose a group key scheme to safeguard multicast privacy with the provisions of availability, fault-tolerance, and efficiency in the context of smart buildings as a part the smart grid  ...  update where n is the group size. 2) Every sponsor should sign and forward a large number of rekeying multicast messages to update a group key.  ... 
doi:10.4236/sgre.2013.44038 fatcat:7vvxjkwxnzhjffle2uagzfowme

Decentralized Key Management Scheme Using Alternating Multilinear Forms for Cloud Data Sharing with Dynamic Multiprivileged Groups

Santhi Kurra, Veeranjaneyulu Naralasetty
2019 Mathematical Modelling and Engineering Problems  
This paper proposes a Decentralized key management scheme using alternating multi linear forms for cloud data sharing with dynamic multi privileged groups.  ...  This method is to divide large group into many subgroups, each sub group has a group manager.  ...  Data confidentially: In one rekeying process, session keys are gotten from past session keys and a discretionary rekeying material when a client leaves/changes from a SG utilizing a confined limit with  ... 
doi:10.18280/mmep.060405 fatcat:tmevizoabbajdhx5mqomnfcy4y

No peeking: privacy-preserving demand response system in smart grids

Depeng Li, Zeyar Aung, John R. Williams, Abel Sanchez
2013 International Journal of Parallel, Emergent and Distributed Systems  
Without a well-designed privacy preservation mechanism, adversaries can capture, model and divulge customers' behaviour and activities.  ...  Unfortunately, privacy violation becomes a pressing challenge that drastically affects the DR programs. Power usage and operational data can be abused to infer personal information of customers.  ...  From an adversary's perspective, we practically illustrate privacy threats with the aid of corresponding examples.  ... 
doi:10.1080/17445760.2013.851677 fatcat:35yoepckuzegfizbfgw3ujuaii

eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart Grid

Mourad Benmalek, Yacine Challal
2015 2015 IEEE Trustcom/BigDataSE/ISPA  
It is a key management scheme that can support unicast, multicast and broadcast communications based on an efficient Multi-group Key graph technique.  ...  AMI is an enabling technology for Smart Grid (SG) and hence represents a privileged target for security attacks with potentially great damage against infrastructures and privacy.  ...  An automatic verification of security with an automated validation tool like AVISPA is also in our perspectives.  ... 
doi:10.1109/trustcom.2015.447 dblp:conf/trustcom/BenmalekC15 fatcat:lopifppoyjf6rkxtopdzqlsycy

Predistribution and local collaboration-based group rekeying for wireless sensor networks

Wensheng Zhang, Sencun Zhu, Guohong Cao
2009 Ad hoc networks  
To address this problem, we propose a family of predistribution and local collaboration-based group rekeying (PCGR) schemes, which update the compromised group keys to prevent the compromised nodes from  ...  To the best of our knowledge, our schemes are the first set of distributed group rekeying schemes for sensor networks without involving online key servers.  ...  We also compare the performance of the proposed schemes with several existing group rekeying schemes.  ... 
doi:10.1016/j.adhoc.2008.11.004 fatcat:7nulgkqbf5du5k53try7cxdgla

Impacts of S1 and X2 Interfaces on eMBMS Handover Failure: Solution and Performance Analysis

Yi Ren, Jyh-Cheng Chen, Jui-Chih Chin
2018 IEEE Transactions on Vehicular Technology  
In this paper, we point out a new handover failure problem in eMBMS due to the miss of rekeying information. We first take a close look at the new handover scenarios.  ...  Moreover, we propose a solution to combat against the handover failure.  ...  When a member joins/leaves the group, a group key needs to be updated to add/revoke the member. The process is referred to as rekeying.  ... 
doi:10.1109/tvt.2018.2812858 fatcat:dmdlar35tramfomtqab6eivacm

Efficient Auditing Scheme for Secure Data Storage in Fog to Cloud Computing

Dr.E.K VellingiriRaj, Thasleema Nasreen.D
2022 Zenodo  
Fog-to-cloud computing has now become a new cutting-edge technique along with the rapid popularity of Internet of Things (IoT).  ...  By implementing MAC and HMAC, we give a concrete instantiation of our auditing system.  ...  Registration and Encryption ➢ Database Storage ➢ Group Key Generation within the workgroup ➢ Keying and rekeying the group key ➢ Sharing the data within workgroup Registration and Encryption:  ... 
doi:10.5281/zenodo.6397125 fatcat:zqxv6ojsivcyxgjognek7gm5fe

Introduction to Section 4 [chapter]

Emiliano Rubens Urciuoli, Valentino Gasparini, Maik Patzelt, Rubina Raja, Anna-Katharina Rieger, Jörg Rüpke, Emiliano Urciuoli
2020 Lived Religion in the Ancient Mediterranean World  
The reader is confronted with a deliberately puzzling chain of connections that draws the origins of the squalor, a custom that had become conventional by Claudius' time, back to the founding myth of the  ...  of a specific group" (Albrecht et al. 2018, 584) .  ... 
doi:10.1515/9783110557596-021 fatcat:z7lhqn3trbd6vlnakfhrwqmbh4

On replacing cryptographic keys in hierarchical key management systems

Anne V.D.M. Kayem, Selim G. Akl, Patrick Martin
2008 Journal of Computer Security  
Each group is assigned a single cryptographic key that is used for encryption/decryption.  ...  Data re-encryption is time-consuming, so, rekeying creates delays that impede performance.  ...  Results for each case are obtained from averages of over 10 runs, with random numbers of rekey requests expressed as proportions of a user group with a maximum of 100 members and files (versions of the  ... 
doi:10.3233/jcs-2008-16303 fatcat:3usm2iiw5bevngv6sdhlem5tyq

Toward live domain-specific languages

Riemer van Rozen, Tijs van der Storm
2017 Journal of Software and Systems Modeling  
In other words, unlike in our setting, HUTN provides a fixed concrete syntax with fixed scoping rules. TMDIFF allows languages to have custom syntax, and custom binding semantics.  ...  First the machine is extended with a locked state in Doors 2 (Fig. 4a ). Second, Doors 3 (Fig. 4b ), shows a grouping feature of the language: the locked state is part of the locking group.  ... 
doi:10.1007/s10270-017-0608-7 fatcat:rxwnoke35rbhbey24x6imqqnyi

A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters

Cas Cremers, Benjamin Kiesl, Niklas Medinger
2020 USENIX Security Symposium  
In particular, it involves various mechanisms that interact with each other in subtle ways, which offers little hope for modular reasoning.  ...  Our model is the first that is detailed enough to detect the KRACK attacks; it includes mechanisms such as the four-way handshake, the group-key handshake, WNM sleep mode, the dataconfidentiality protocol  ...  A rekey of the group temporal key can involve a new iteration of the four-way handshake with one supplicant (the one who initiated the rekey) and socalled group-key handshakes with the other supplicants  ... 
dblp:conf/uss/CremersKM20 fatcat:qqrva2r5mzfaldyp6yny2ddts4

Keying Methods of using Protocols for Cryptography in Wireless Networks

2019 International Journal of Engineering and Advanced Technology  
The rekeying convention understands customer express statistics, as an example, region records as a key seed. This gadget consists of operational modes.  ...  be obliged remote sensor systems, wherein as it has a few detainment in asset use.  ...  The sending module handles the path in the direction of sending and suffering of encoded groups while in motion to the sink. A.  ... 
doi:10.35940/ijeat.f1186.0886s219 fatcat:sj7j2p2qvnd4ppbas4y42zjelm

Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey [article]

Amrita Ghosal, Mauro Conti
2018 arXiv   pre-print
We also provide a classification of the existing works in literature that deal with secure key management system in AMI. Finally, we identify possible future research directions of KMS in AMI.  ...  Thus, AMI plays a significant role in the smooth functioning of smart grids. AMI is a privileged target for security attacks as it is made up of systems that are highly vulnerable to such attacks.  ...  The scheme is based on a multi-group key graph structure that supports the management of multiple demand response projects concurrently for every customer.  ... 
arXiv:1806.00121v1 fatcat:kbbuv36djnby3i4rlm4fapw2ja
« Previous Showing results 1 — 15 out of 295 results