29 research outputs found

    Host mobility key management in dynamic secure group communication

    Get PDF
    The key management has a fundamental role in securing group communications taking place over vast and unprotected networks. It is concerned with the distribution and update of the keying materials whenever any changes occur in the group membership. Wireless mobile environments enable members to move freely within the networks, which causes more difficulty to design efficient and scalable key management protocols. This is partly because both member location dynamic and group membership dynamic must be managed concurrently, which may lead to significant rekeying overhead. This paper presents a hierarchical group key management scheme taking the mobility of members into consideration intended for wireless mobile environments. The proposed scheme supports the mobility of members across wireless mobile environments while remaining in the group session with minimum rekeying transmission overhead. Furthermore, the proposed scheme alleviates 1-affect-n phenomenon, single point of failure, and signaling load caused by moving members at the core network. Simulation results shows that the scheme surpasses other existing efforts in terms of communication overhead and affected members. The security requirements studies also show the backward and forward secrecy is preserved in the proposed scheme even though the members move between areas

    Fault-tolerant and Scalable Key Management Protocol for IoT-based Collaborative Groups

    Get PDF
    International audienceSecuring collaborative applications relies heavily on the underlying group key management protocols. Designing these protocols ischallenging, especially in the context of the Internet of Things (IoT). Indeed, the presence of heterogeneous and dynamic members within the collaborative groups usually involves resource constrained entities, which require energy-aware protocols to manage frequent arrivals and departures of members. Moreover, both fault tolerance and scalability are sought for sensitive and large collaborative groups. To address these challenges, we propose to enhance our previously proposed protocol (i.e. DBGK) with polynomial computations. In fact, our contribution in this paper, allows additional controllers to be included with no impact on storage cost regarding constrained members. To assess our protocol called DsBGK, we conducted extensive simulations. Results confirmed that DsBGK achieves a better scalability and fault tolerance compared to DBGK. In addition, energy consumption induced by group key rekeying has been reduced

    Applications of Induced-Charge Electrokinetic in Microfluidics

    No full text

    Degenerative Disc Disease Mimicking Spondylodiscitis with Bilateral Psoas Abscesses.

    No full text
    Sequestered disc fragments may present as a lesion with peripheral enhancement on magnetic resonance imaging. When located in the psoas muscle compartment, this finding could mimic an abscess. We describe a case of a 52-year-old man who returned from Togo after 2 years of living in precarious conditions. He was afebrile and complaining of lumbar back pain. The magnetic resonance imaging showed L3 and L4 vertebral body enhancement with bilateral psoas lesions in continuity with the disc space, suggesting spondylodiscitis with a differential diagnosis of inflammatory herniated disc. A computed tomography-guided biopsy of the right psoas lesion was performed to rule out spondylodiscitis. Histology was compatible with extruded disc material. Herniated disc fragments should be considered as a differential diagnosis of psoas abscesses. Coronal plane images may show the continuity of bilateral herniated disc fragments, mimicking psoas abscesses
    corecore