47 research outputs found

    (In)security of efficient tree-based group key agreement using bilinear map

    Get PDF
    A group key agreement protocol enables three or more parties to agree on a secret group key to allow for communication of secret messages between them. In this paper, we consider the security of an efficiency-improved version of the tree-based group key agreement protocol using bilinear maps proposed by Lee et al., and claimed to reduce computational costs while preserving security. To be precise, we show several attacks on this protocol and discuss how they could have been avoided

    Group Key Rekeying Technique with Secure Data Encryption in MANETs

    Get PDF
    A Mobile Ad hoc Network (MANET) is a collection of autonomous nodes or mobile devices that can arrange themselves in various ways and operate without strict network administration. Ensuring security in mobile ad hoc network is a challenging issue and most of the applications in mobile ad hoc networks involve group-oriented communication. In Mobile ad-hoc network, each node treated as a terminal and also acts as an intermediate router. In this scenario, multi-hop occurs for communication in mobile ad hoc network. There may be a possibility of threats and malicious nodes in between source and destination. Providing the security in MANET is entirely different from the traditional wired network. In the present scenario, various applications of the mobile ad hoc network have been proposed and issues are solved by using the cryptographic techniques. Mostly cryptographic techniques are used to provide the security to MANETs. Cryptographic techniques will not be efficient security mechanism if the key management is weak. The purpose of key management is to provide secure procedures for handling keys in the cryptographic technique. The responsibilities of key management include key generation, key distribution, and key maintenance. Several key management schemes have been introduced for MANETs. The Group key management scheme is an efficient method for key management in MANET. In group key management scheme, rekeying is used whenever a new node joins or existing node leaves from the group. In this paper, we propose a periodic rekeying method (PRK) and analyze the performance of LKH rekeying techniques in a group key management schemes. The symmetric encryption techniques are analyzed with different parameters, such as Throughput and Energy consumption. Security and performance of rekeying protocols are analyzed through detailed study and simulation

    Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks are promising solutions for many applications. However, wireless sensor nodes suffer from many constraints such as low computation capability, small memory, limited energy resources, and so on. Grouping is an important technique to localize computation and reduce communication overhead in wireless sensor networks. In this paper, we use grouping to refer to the process of combining a set of sensor nodes with similar properties. We propose two centralized group rekeying (CGK) schemes for secure group communication in sensor networks. The lifetime of a group is divided into three phases, i.e., group formation, group maintenance, and group dissolution. We demonstrate how to set up the group and establish the group key in each phase. Our analysis shows that the proposed two schemes are computationally efficient and secure

    ДинамичСскиС ΠΊΠΎΠ°Π»ΠΈΡ†ΠΈΠΈ β€” новая ΠΏΠ°Ρ€Π°Π΄ΠΈΠ³ΠΌΠ° Π² области распрСдСлСнных ΠΊΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½ΠΎ-ΠΊΠΎΠΌΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… систСм. Π§.1. ΠžΡΠ½ΠΎΠ²Π½Ρ‹Π΅ Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΡ‹ криптографичСской Π·Π°Ρ‰ΠΈΡ‚Ρ‹

    Get PDF
    ДаСтся ΠΎΠ±Π·ΠΎΡ€ Π½ΠΎΠ²ΠΎΠ³ΠΎ направлСния Π² области распрСдСлСнных Π²Ρ‹Ρ‡ΠΈΡΠ»ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Ρ… систСм, связанного с Π·Π°Ρ‰ΠΈΡ‚ΠΎΠΉ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ Π² ΠΊΠΎΠ°Π»ΠΈΡ†ΠΈΠΎΠ½Π½Ρ‹Ρ… Π³Ρ€ΡƒΠΏΠΏΠΎΠ²Ρ‹Ρ… ΠΎΠ±ΡŠΠ΅Π΄ΠΈΠ½Π΅Π½ΠΈΡΡ…. Π Π°ΡΡΠΌΠ°Ρ‚Ρ€ΠΈΠ²Π°ΡŽΡ‚ΡΡ вопросы опрСдСлСния динамичСской ΠΊΠΎΠ°Π»ΠΈΡ†ΠΈΠΈ, Π° Ρ‚Π°ΠΊΠΆΠ΅ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½Ρ‹Ρ… Ρ‚ΠΈΠΏΠΎΠ² динамичСских ΠΊΠΎΠ°Π»ΠΈΡ†ΠΈΠΎΠ½Π½Ρ‹Ρ… срСд. ΠŸΡ€ΠΈ Π²Π΅Π΄Π΅Π½Ρ‹ основныС Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΡ‹ Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΊΠΎΠΌΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… ΠΎΠ±ΠΌΠ΅Π½ΠΎΠ² Π² ΠΊΠΎΠ°Π»ΠΈΡ†ΠΈΠΎΠ½Π½Ρ‹Ρ… Π³Ρ€ΡƒΠΏΠΏΠ°Ρ….ΠΠ°Π΄Π°Ρ”Ρ‚ΡŒΡΡ огляд Π½ΠΎΠ²ΠΎΠ³ΠΎ напрямку Π² області Ρ€ΠΎΠ·ΠΏΠΎΠ΄Ρ–Π»Π΅Π½ΠΈΡ… ΠΎΠ±Ρ‡ΠΈΡΠ»ΡŽΠ²Π°Π»ΡŒΠ½ΠΈΡ… систСм, Ρ‰ΠΎ пов’язаний Ρ–Π· захистом Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–Ρ— Π² ΠΊΠΎΠ°Π»Ρ–Ρ†Ρ–ΠΉΠ½ΠΈΡ… угрупованнях. Π ΠΎΠ·Π³Π»ΡΠ΄Π°ΡŽΡ‚ΡŒΡΡ питання визначСння Π΄ΠΈΠ½Π°ΠΌΡ–Ρ‡Π½ΠΎΡ— ΠΊΠΎΠ°Π»Ρ–Ρ†Ρ–Ρ—, Π° Ρ‚Π°ΠΊΠΎΠΆ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΈΡ… Ρ‚ΠΈΠΏΡ–Π² ΠΊΠΎΠ°Π»Ρ–Ρ†Ρ–ΠΉΠ½ΠΈΡ… сСрСдовищ. НавСдСно основні Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠΈ захисту ΠΊΠΎΠΌΡƒΠ½Ρ–ΠΊΠ°Ρ†Ρ–ΠΉΠ½ΠΈΡ… ΠΎΠ±ΠΌΡ–Π½Ρ–Π² Π² ΠΊΠΎΠ°Π»Ρ–Ρ†Ρ–ΠΉΠ½ΠΈΡ… угрупуваннях.This paper introduces the novel direction in distributed computer and communication systems, considering security in dynamic coalition environments. The definition of dynamic coalition environment, as well as types of dynamic coalitions, are examined. Basic algorithms, that provide secure communications for coalition groups, are revisited

    (In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map

    Get PDF
    A group key agreement protocol enables three or more parties to agree on a secret group key to allow for communication of secret messages between them. In this paper, we consider the security of an efficiency-improved version of the tree-based group key agreement protocol using bilinear maps proposed by Lee et al., and claimed to reduce computational costs while preserving security. To be precise, we show several attacks on this protocol and discuss how they could have been avoided
    corecore