The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSNs), deployed in distributed Internet of Things (IoT) applications, measure data, process, exchange information, and function collaboratively with other sensor nodes and end-users, which can be internal or external to the network. To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication...
End to end security in IoT is becoming a challenging issue in the upcoming smart world. Providing security in a heterogeneous environment is a critical factor when the devices are resource constrained in nature. In this work, a novel certificate-less collaborative key agreement technique has been proposed for IoT, where the computationally heavy tasks are handed over to unconstrained nodes. The receiver...
Research on secure key management in Wireless Sensor Networks (WSNs) using cryptography has gained significant attention in the research community. However, ensuring security with public key cryptography is a challenging task due to resource limitation of sensor nodes in WSNs. In recent years, numerous researchers have proposed efficient lightweight key management schemes to establish secure communication...
A secure interconnection of objects through RFID technology extends the range of information availability. Security in this integration is achievable through proper identification, authentication, grouping / yoking, distance bounding, and tag and ownership transfer protocols. This work analyzes the computational and communicational cost of group and authentication protocols. Further, these protocols...
Building a secure wireless adhoc network to communicate and sharing data, resource between user based on the key exchange methods. Security services such as authentication and pair wise key establishment are critical to wireless network. So we enable wireless node to communicate more securely with each other using cryptographic techniques. IN this paper we propose polynomial key pre distribution,...
In Vehicular Ad-hoc Networks (VANETs), node authentication is an inherent problem since nodes enter and leave the network freely. In wireless networks, the management of identities becomes important because of the propagation medium, where problems such as the loss of node's privacy, the disclosure of personal information, and particularly identity theft and impersonation should be avoided. This paper...
JXME is the JXTA protocols implementation for mobile devices using J2ME. Two different flavors of JXME have been implemented, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default...
Many applications in Dynamic Peer Group are becoming increasing popular nowadays. There is a need for security services to provide group-oriented communication privacy and data integrity. To provide this form of group communication privacy, it is important that members of the group can establish a common secret key for encrypting group communication data. A secure distributed group key agreement and...
Many emerging network applications are based upon a group communication model. In a peer-to-peer or ad-hoc network which do not have a previously agreed upon common secret key, communication is susceptible to eavesdropping, Hence a secure distributed group key agreement is required to establish and authenticate a common group key for secure and private communication. This paper presents an authenticated...
This paper describes a new security framework that will leverage the security in cognitive radio cooperative protocols. The architecture uses the 802.1X access control mechanism and is supported by a Key Distribution Center (KDC) built upon an 802.1X Authentication Server. The KDC is used, together with a new terminal identification policy and modified DHCP servers, to provide proper resource allocation...
The trend on the proliferation of handheld devices triggered an increase on the development of pervasive and personalized mobile applications that exploit and support peer-to-peer/ad-hoc networks. This creates the conditions and motivation for a mobile electronic ID system, preferably one which provides a friendly privacy solution. The existing mobile identification solutions place the interviewer...
Multicast services raise significant operational and security challenges not only when deployed on the Internet layer, but also in overlay networks. Large P2P groups as emerging from IPTV applications may be abused by unwanted traffic or denial of service attacks through amplified flooding. In this paper, we introduce a distributed, autonomously verifiable scheme for multicast sender authentication,...
Identity based cryptography (IBC) was introduced into peer-to-peer (P2P) networks recently for identity verification and authentication purposes. However, current IBC-based solutions could not address the problem of secure private key issuing. In this paper we propose SKIP: a novel secure key issuing scheme for P2P networks using IBC. We present an IBC infrastructure setup phase, a peer registration...
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based trust management system (TMS). Most of previous work concentrates on how to rate peerspsila behaviors with the trust mechanism and how to establish the reputation-based...
Grid systems provide a standard platform to share resources, such as computing facilities and backup services, between research communities and commercial organizations. Nowadays there are plenty of grids among different institutions, and many of them are probably heterogeneous to others because they are constructed by different types of middleware. Enabling all these grids to work as a single grid...
This paper presents a distributed authentication architecture based on peer-to-peer networking paradigms to minimise the delays in authenticating and authorising mobile nodes roaming across different wireless networks. The fundamental principle is to provide a mechanism to shift elements required for authentication closer to the mobile node's current point of access thus reducing the need for interaction...
Peer-to-peer based live stream sharing platform is a novel technique for distributing visual data. Because of developments in computer equipment and network service, viewers can watch shows via the Internet rather than through the conventional broadcasted manner. Although data access via the Internet is more convenient, it is more difficult to manage the data transmission, and issues such as copyrighting...
Most of the current trust models in peer-to-peer (P2P) networks are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. In addition, the conventional access control mechanism is not suitable because the P2P networks is decentralize and dynamic one. We propose a neighborhood key method, authentication scheme base on zero-knowledge proof...
Threshold cryptography distributes the ability to provide a cryptographic service such as decryption or signing. It is an ideal choice to provide security services, such as authentication and access control, in MANETs or P2P systems. The paper proposes an ID- based threshold signature scheme, which has three attractive properties: (1) The user's co-signing key and signature share are all verifiable,...
Many critical systems require high reliability and availability even when the systems are being maintained or upgraded. Soft System Bus (SSB) is the middleware for such systems. A conceptual architecture of SSB based on structured p2p network was proposed in our previous work. But, how high reliability and availability can be ensured was left unsolved. In this paper, we propose mechanisms to solve...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.