Search results for "Group key"

showing 3 items of 3 documents

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments

2020

Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…

PROTOCOLSCRYPTOGRAPHYComputer Networks and CommunicationsComputer scienceGROUP COMMUNICATIONKey distributionCore networkRESEAU INFORMATIQUEAccess control02 engineering and technologySCALABILITYTECHNOLOGIE SANS FIL[SPI]Engineering Sciences [physics][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]TELECOMMUNICATIONForward secrecy0202 electrical engineering electronic engineering information engineeringRekeyingINTERNET OF THINGSElectrical and Electronic EngineeringINTERNETSECURITEDYNAMIC ENVIRONMENTSECURITYIOTTRAITEMENT DES DONNEESbusiness.industryKey distribution center020206 networking & telecommunicationsWIRELESS SENSOR NETWORKSRESEAU DE TELECOMMUNICATIONSGROUP KEY MANAGEMENTINFORMATIQUECommunication in small groupsScalabilityARCHITECTURE CLIENT-SERVEURbusinessCOMPUTER ARCHITECTUREACCESS CONTROLComputer network
researchProduct

SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs

2011

How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks. By implementing our scheme on a Sun SPOT based sensor network testbed, we demonstrate that the time for updating a new group key varies from 56 ms to 546 ms and the energy consumption is limited to 16.5–225 mJ, depending on the length of secret keys and the number of sensors in a group.

business.industryComputer scienceNode (networking)TestbedMobile computingEnergy consumptionSun SPOTKey distribution in wireless sensor networksForward secrecyMobile telephonybusinessWireless sensor networkComputer networkGroup key2011 IEEE 36th Conference on Local Computer Networks
researchProduct

FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs

2012

Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day and any-place health monitoring. To protect confidentiality of collected data, a shared group key is usually deployed in a BAN, and consequently a secure communication group is generated. In this paper, we propose a bi-directional security and collusion resilience key management scheme for BAN, referred to as FoSBaS. Detailed analysis shows that the scheme can provide both forward security and backward security and resist against collusion attacks. Furthermore, the FoSBaS is implemented on a Sun …

business.industryComputer scienceNode (networking)TestbedCryptographyEnergy consumptionSun SPOTComputer securitycomputer.software_genreSecure communicationForward secrecyBody area networkSecrecyResilience (network)businessKey managementcomputerWireless sensor networkGroup keyComputer network2012 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct