The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a multicasting environment, group communications is essential. An important issue of providing secure group communications is group key management. The exclusion basis system (EBS) provides a framework for supporting group key management, especially in a large-size network. In EBS, a key server (KS) is used to generate both administration and session keys. In turn, KS uses these keys to distribute...
Wildcard identity-based encryption (IBE) provides an effective means of communicating among groups which do not have a well-defined membership or hierarchy pre-established, as may frequently be the case in dynamic coalition operations. The protection of group communication against compromised nodes is, however, expensive in that it typically requires frequent re-keying in the case of attribute-based...
We consider the problem of secure communication in wireless fading channels in the presence of non-colluding passive eavesdroppers. The transmitter has multiple antennas and is able to simultaneously transmit an information bearing signal to the intended receiver and artificial noise to the eavesdroppers. We obtain an analytical closed-form lower bound for secrecy capacity, which is used as the objective...
The sensors in a DMSNs are often used for forming logical groups within the network for performing collaborative tasks which need to ensure that sensors participating in the groups are legitimate and securely introduced in the group. This paper is built upon the unique integration of several cryptographic techniques. Based on the one-way accumulator, an efficient mechanism of node membership verification...
Random key pre-distribution scheme is a flexible key management scheme for wireless sensor networks. Recently, numerous related studies have been proposed. However, most of them have weaknesses. First of all, sensors require large storage to store keys in order to maintain high connectivity. Secondly, impact caused by compromised sensors cannot be completely eliminated. In this paper, a novel pair-wise...
Multicast is a scalable solution for group communication. In order to offer security for multicast applications, a group key has to be changed whenever a member joins or leaves the group. This incurs 1-affect-n problem, which is a constraint on scalability. Decentralized approaches solve the scalability problem by dividing a group into subgroups that use independent group keys. These approaches, however,...
The coverage problem in which a set of sensors is required to collaborate so as to preserve the whole perimeter of a big object is known as the perimeter coverage problem. With the assumption that two sensors are neighbors and connected if they have overlapping cover ranges, we have developed distributed algorithms to find the set of sensors to cover the entire perimeter with the minimum size and...
Predistribution of cryptographic keys is a widely used approach for establishing secure communication between network nodes which are severely resource-constrained. Many proposed key predistribution schemes make the implicit assumption that message contents need not be kept private from nodes other than the intended recipient. Messages in such schemes are not guaranteed to be confidential--they may...
To solve the security issues in WMN (wireless mesh network), a session key negotiation model based on multi-path in WMN has been proposed, which realizes the pre-detection of Byzantine nodes and prevent the mesh nodes from the man-in-the-middle attacking. Petri net theory is introduced to analyze, in a formalized way, the feature and security of the new model. Solution to the loophole discovered by...
ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4's physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist. In particular we show that the end-to-end application key establishment protocol is flawed and we propose...
3G-WLAN is a companion system of third-generation (3G) cellular systems and WLAN systems. By integration of these two systems, users can not only be offered a bit rate expectation placed on 3G systems, but also sufficient roaming and mobility support. Through 3G-WLAN, users could accesses into 3G application servers and makes use of service of these server. The services usually make use of the technique...
Multicasting is an efficient communication mechanism to deliver information to a number of recipients. Due to the broadcast nature of wireless communication, multicasting has great potential for commercial and military applications in wireless networks. In this paper, we propose a secure and efficient key management scheme, hybrid key management (HKM), for the wireless multicasting. Compared to the...
Based on Lyapunov stabilization theorem, considering the diffusionless chaotic system, a method is proposed for global chaos synchronization of three identical systems. Meanwhile, the method of three different structures chaotic systems global synchronization is shown. Then this method is applied to secure communication through chaotic masking, use three coupled identical systems, propose a novel...
Identifying elephant flows is very important in developing effective and efficient traffic engineering schemes. In addition, obtaining the statistics of these flows is also very useful for network operation and management. In this paper, we propose a novel method to identify elephant flows by introducing a reversible counting bloom filter (RCBF), a special counting bloom filter. The RCBF consists...
Many approaches have been proposed to secure various ad hoc routing protocols. However, many attacks such as wormhole attacks, vertex cut attacks, and traffic-analysis based attacks are still not well addressed. In this paper, we propose a novel secure routing protocol DAAODV which is based on ad-hoc on-demand distance vector routing (AODV). DAAODV takes full advantage of trusted computing technology,...
Tiered wireless sensor networks (WSNs) have many advantages over traditional WSNs. However they are vulnerable to security attacks, especially those targeting at the storage nodes that bu er and process the data readings from sensors. In this paper, we propose a Secure Data Collection protocol - SDC to support time-based queries in tiered WSNs. With small overhead introduced to data communication,...
The Third Generation Partnership Project (3GPP) has been specifying the standards of Long Term Evolution (LTE) for 3G radio access. The security concerns in wireless networks might have prevented its further widespread adoption. Layered security approach in LTE is analyzed, an EAP method EAP-Archie used for authentication and ciphering is introduced in this paper. EAP-Archie which embedded in Open...
Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric cryptographic protocols are not suitable for the resource-constrained wireless sensor nodes. Several key pre-distribution schemes have been proposed in literature to establish pairwise key between sensor nodes, but most of which only...
Group key management is a difficult task in implementing large and dynamic secure multicast. In this paper, a new scheme is proposed in the basis of in-depth analysis of the requirements of the secure multicast and group key management. The scheme is based on the multicast group security architecture and multicast security group key management architecture proposed by IETF. This scheme constructs...
One of the killer applications for radio frequency identification (RFID) system is the automatic identification of physical objects. To do that, each object must be labeled with a RFID tag containing identifying data. However, collisions occur when several tags send their data simultaneously. This paper proposes a secure scheme for zero-collision RFID tags identification based on code division multiple...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.