47 research outputs found
(In)security of efficient tree-based group key agreement using bilinear map
A group key agreement protocol enables three or more parties to agree on a secret group key to allow for communication of secret messages between them. In this paper, we consider the security of an efficiency-improved version of the tree-based group key agreement protocol using bilinear maps proposed by Lee et al., and claimed to reduce computational costs while preserving security. To be precise, we show several attacks on this protocol and discuss how they could have been avoided
Group Key Rekeying Technique with Secure Data Encryption in MANETs
A Mobile Ad hoc Network (MANET) is a collection of autonomous nodes or mobile devices that can arrange themselves in various ways and operate without strict network administration. Ensuring security in mobile ad hoc network is a challenging issue and most of the applications in mobile ad hoc networks involve group-oriented communication. In Mobile ad-hoc network, each node treated as a terminal and also acts as an intermediate router. In this scenario, multi-hop occurs for communication in mobile ad hoc network. There may be a possibility of threats and malicious nodes in between source and destination. Providing the security in MANET is entirely different from the traditional wired network. In the present scenario, various applications of the mobile ad hoc network have been proposed and issues are solved by using the cryptographic techniques. Mostly cryptographic techniques are used to provide the security to MANETs. Cryptographic techniques will not be efficient security mechanism if the key management is weak. The purpose of key management is to provide secure procedures for handling keys in the cryptographic technique. The responsibilities of key management include key generation, key distribution, and key maintenance. Several key management schemes have been introduced for MANETs. The Group key management scheme is an efficient method for key management in MANET. In group key management scheme, rekeying is used whenever a new node joins or existing node leaves from the group. In this paper, we propose a periodic rekeying method (PRK) and analyze the performance of LKH rekeying techniques in a group key management schemes. The symmetric encryption techniques are analyzed with different parameters, such as Throughput and Energy consumption. Security and performance of rekeying protocols are analyzed through detailed study and simulation
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks
Wireless sensor networks are promising solutions for many applications. However, wireless sensor nodes suffer from many constraints such as low computation capability, small memory, limited energy resources, and so on. Grouping is an important technique to localize computation and reduce communication overhead in wireless sensor networks. In this paper, we use grouping to refer to the process of combining a set of sensor nodes with similar properties. We propose two centralized group rekeying (CGK) schemes for secure group communication in sensor networks. The lifetime of a group is divided into three phases, i.e., group formation, group maintenance, and group dissolution. We demonstrate how to set up the group and establish the group key in each phase. Our analysis shows that the proposed two schemes are computationally efficient and secure
ΠΠΈΠ½Π°ΠΌΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΠΊΠΎΠ°Π»ΠΈΡΠΈΠΈ β Π½ΠΎΠ²Π°Ρ ΠΏΠ°ΡΠ°Π΄ΠΈΠ³ΠΌΠ° Π² ΠΎΠ±Π»Π°ΡΡΠΈ ΡΠ°ΡΠΏΡΠ΅Π΄Π΅Π»Π΅Π½Π½ΡΡ ΠΊΠΎΠΌΠΏΡΡΡΠ΅ΡΠ½ΠΎ-ΠΊΠΎΠΌΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΎΠ½Π½ΡΡ ΡΠΈΡΡΠ΅ΠΌ. Π§.1. ΠΡΠ½ΠΎΠ²Π½ΡΠ΅ Π°Π»Π³ΠΎΡΠΈΡΠΌΡ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠΉ Π·Π°ΡΠΈΡΡ
ΠΠ°Π΅ΡΡΡ ΠΎΠ±Π·ΠΎΡ Π½ΠΎΠ²ΠΎΠ³ΠΎ Π½Π°ΠΏΡΠ°Π²Π»Π΅Π½ΠΈΡ Π² ΠΎΠ±Π»Π°ΡΡΠΈ ΡΠ°ΡΠΏΡΠ΅Π΄Π΅Π»Π΅Π½Π½ΡΡ
Π²ΡΡΠΈΡΠ»ΠΈΡΠ΅Π»ΡΠ½ΡΡ
ΡΠΈΡΡΠ΅ΠΌ, ΡΠ²ΡΠ·Π°Π½Π½ΠΎΠ³ΠΎ Ρ Π·Π°ΡΠΈΡΠΎΠΉ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ Π² ΠΊΠΎΠ°Π»ΠΈΡΠΈΠΎΠ½Π½ΡΡ
Π³ΡΡΠΏΠΏΠΎΠ²ΡΡ
ΠΎΠ±ΡΠ΅Π΄ΠΈΠ½Π΅Π½ΠΈΡΡ
. Π Π°ΡΡΠΌΠ°ΡΡΠΈΠ²Π°ΡΡΡΡ Π²ΠΎΠΏΡΠΎΡΡ ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½ΠΈΡ Π΄ΠΈΠ½Π°ΠΌΠΈΡΠ΅ΡΠΊΠΎΠΉ ΠΊΠΎΠ°Π»ΠΈΡΠΈΠΈ, Π° ΡΠ°ΠΊΠΆΠ΅ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΡΡ
ΡΠΈΠΏΠΎΠ² Π΄ΠΈΠ½Π°ΠΌΠΈΡΠ΅ΡΠΊΠΈΡ
ΠΊΠΎΠ°Π»ΠΈΡΠΈΠΎΠ½Π½ΡΡ
ΡΡΠ΅Π΄. ΠΡΠΈ Π²Π΅Π΄Π΅Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΡΠ΅ Π°Π»Π³ΠΎΡΠΈΡΠΌΡ Π·Π°ΡΠΈΡΡ ΠΊΠΎΠΌΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΠΎΠ±ΠΌΠ΅Π½ΠΎΠ² Π² ΠΊΠΎΠ°Π»ΠΈΡΠΈΠΎΠ½Π½ΡΡ
Π³ΡΡΠΏΠΏΠ°Ρ
.ΠΠ°Π΄Π°ΡΡΡΡΡ ΠΎΠ³Π»ΡΠ΄ Π½ΠΎΠ²ΠΎΠ³ΠΎ Π½Π°ΠΏΡΡΠΌΠΊΡ Π² ΠΎΠ±Π»Π°ΡΡΡ ΡΠΎΠ·ΠΏΠΎΠ΄ΡΠ»Π΅Π½ΠΈΡ
ΠΎΠ±ΡΠΈΡΠ»ΡΠ²Π°Π»ΡΠ½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ, ΡΠΎ ΠΏΠΎΠ²βΡΠ·Π°Π½ΠΈΠΉ ΡΠ· Π·Π°Ρ
ΠΈΡΡΠΎΠΌ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ Π² ΠΊΠΎΠ°Π»ΡΡΡΠΉΠ½ΠΈΡ
ΡΠ³ΡΡΠΏΠΎΠ²Π°Π½Π½ΡΡ
. Π ΠΎΠ·Π³Π»ΡΠ΄Π°ΡΡΡΡΡ ΠΏΠΈΡΠ°Π½Π½Ρ Π²ΠΈΠ·Π½Π°ΡΠ΅Π½Π½Ρ Π΄ΠΈΠ½Π°ΠΌΡΡΠ½ΠΎΡ ΠΊΠΎΠ°Π»ΡΡΡΡ, Π° ΡΠ°ΠΊΠΎΠΆ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΈΡ
ΡΠΈΠΏΡΠ² ΠΊΠΎΠ°Π»ΡΡΡΠΉΠ½ΠΈΡ
ΡΠ΅ΡΠ΅Π΄ΠΎΠ²ΠΈΡ. ΠΠ°Π²Π΅Π΄Π΅Π½ΠΎ ΠΎΡΠ½ΠΎΠ²Π½Ρ Π°Π»Π³ΠΎΡΠΈΡΠΌΠΈ Π·Π°Ρ
ΠΈΡΡΡ ΠΊΠΎΠΌΡΠ½ΡΠΊΠ°ΡΡΠΉΠ½ΠΈΡ
ΠΎΠ±ΠΌΡΠ½ΡΠ² Π² ΠΊΠΎΠ°Π»ΡΡΡΠΉΠ½ΠΈΡ
ΡΠ³ΡΡΠΏΡΠ²Π°Π½Π½ΡΡ
.This paper introduces the novel direction in distributed computer and communication systems, considering security in dynamic coalition environments. The definition of dynamic coalition environment, as well as types of dynamic coalitions, are examined. Basic algorithms, that provide secure communications for coalition groups, are revisited
(In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map
A group key agreement protocol enables three or more parties to agree on a secret group key to allow for communication of secret messages between them. In this paper, we consider the security of an efficiency-improved version of the tree-based group key agreement protocol using bilinear maps proposed by Lee et al., and claimed to reduce computational costs while preserving security. To be precise, we show several attacks on this protocol and discuss how they could have been avoided