PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Analiza schematów SH-GKDS

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
EN
Analysis of Self-healing Group Key Distribution Schemes (SH-GKDS)
Języki publikacji
PL
Abstrakty
PL
Artykuł przybliża techniki selektywnej dystrybucji kryptograficznego klucza grupowego w kanale rozsiewczym ze stratami. Stanowi on wprowadzenie do klasy schematów Self-healing Group Key Distribution Schemes (SH-GKDS). Przedstawiono w nim najważniejsze mechanizmy wykorzystywane w projektowaniu schematów SH-GKDS, kładąc nacisk na analizę ich właściwości pod kątem bezpieczeństwa, skalowalności oraz czasu działania systemu stosującego schemat SH-GKDS.
EN
The paper presents techniques for selective group key distribution over an unreliable broadcast channel. It provides introduction to Self-healing Group Key Distribution Schemes (SH-GKDS), including guidelines for scheme design and analysis. The most important mechanisms used in SH-GKDS are described and analysed in terms of security, scalability and system life-time.
Wydawca
Rocznik
Tom
Strony
26--35
Opis fizyczny
Bibliogr. 27 poz., rys., tab.
Twórcy
autor
  • AGH Akademia Górniczo-Hutnicza w Krakowie, Katedra Telekomunikacji
autor
  • AGH Akademia Górniczo-Hutnicza w Krakowie, Katedra Telekomunikacji
Bibliografia
  • [1] Staddon J. et al.: Self-Healing Key Distribution with Revocation. IEEE Symposium on Security and Privacy, p. 241, May 2002
  • [2] Liu D., Ning P., Sun K.: Efficient self-healing group key distribution with revocation capability. [w:] Proceedings of the 10th ACM conference on Computer and communications security, New York, NY, USA, 2003, s. 231-240
  • [3] Blundo C., D'arco P., Santis A.D., Listo M.: Design of Self-Healing Key Distribution Schemes. Des. Codes Cryptography, vol. 32, s. 15-44, May 2004
  • [4] Hong D., Kang J.-S.: An efficient key distribution scheme with self-healing property. Communications Letters, IEEE, vol. 9, No. 8, s. 759-761, Aug. 2005
  • [5] Dutta R., Wu Y.D., Mukhopadhyay S.: Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network. [w:] Communications, 2007. ICC '07. IEEE International Conference on, Glasgow, Scotlan, Jun. 2007, s. 1323-1328
  • [6] Dutta R., Mukhopadhyay S.: Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network. [w:] Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE, Kowloon, China, Mar. 2007, s. 2963-2968
  • [7] Daza V., Herranz J., Saez G.: Flaws in some self- healing key distribution schemes with revocation. Inf. Process. Lett., vol. 109, s. 523-526, May 2009
  • [8] Yuan T., Ma J., Zhong Y., Zhang S.: Self-Healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks. [w:] Proceedings of the 2008 International Multi-symposiums on Computer and Computational Sciences, Washington, DC, USA, Oct. 2008, s. 83-90
  • [9] Dutta R., Mukhopadhyay S., Dowling T.: Trade-off between collusion resistance and user life cycle in self-healing key distributions with t-revocation. [w:] Applications of Digital Information and Web Technologies, 2009. ICADIWT '09. Second International Conference on the, London, UK, Aug. 2009, s. 603-608
  • [10] Dutta R., Mukhopadhyay S., Collier M.: Computationally secure self-healing key distribution with revocation in wireless ad hoc networks. Ad Hoc Networks, vol. 8, No. 6, s. 597-613, 2010
  • [11] Han S., Tian B., He M., Chang E.: Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks. Wireless Communications, IEEE Transactions on, vol. 8, s. 1876-1887, Apr. 2009
  • [12] Zou X., Dai Y.-S.: A Robust and Stateless Self- healing Group Key Management Scheme. [w:] Communication Technology, 2006. ICCT '06. International Conference on, Guilin, China, Nov. 2006, s. 1-4
  • [13] Tian B., Han S., Dillon T.S.: An Efficient Self-Healing Key Distribution Scheme. [w:] New Technologies, Mobility and Security, 2008. NTMS '08, Tangier, Morocco, Nov. 2008, s. 1-5
  • [14] Dutta R., Mukhopadhyay S., Dowling T.: Enhanced Access Polynomial Based Self-healing Key Distribution. [w:] Security in Emerging Wireless Communication and Networking Systems, O. Akan, et al., Eds. Springer Berlin Heidelberg, 2010, vol. 42, s. 13-24
  • [15] Yuan T, Ma J., Zhong Y., Zhang S.: Efficient Self- healing Key Distribution with Limited Group Membership for Communication-Constrained Networks. [w:] Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, vol. 1, Washington, DC, USA, 2008, s. 453-458
  • [16] Yuan T., Ma J., Zhong Y., Zhang S.: Self-Healing Key Distribution with Limited Group Membership Property. [w:] Proceedings of the 2008 First International Conference on Intelligent Networks and Intelligent Systems, Washington, DC, USA, Nov. 2008, s. 309-312
  • [17] Saez G.: On Threshold Self-healing Key Distribution Schemes. [w:] Cryptography and Coding, N. Smart, Ed. Springer Berlin / Heidelberg, 2005, vol. 3796, s. 340-354
  • [18] Tian B., Han S., Dillon T.S., Das S.: A self-healing key distribution scheme based on vector space secret sharing and one way hash chains. [w:] Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks, Washington, DC, USA, Jun. 2008, ps. 1-6
  • [19] Dutta R., Mukhopadhyay S., Das A., Emmanuel S.: Generalized self-healing key distribution using vector space access structure. [w:] Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet, Berlin, Heidelberg, 2008, s. 612-623
  • [20] Gu J., Xue Z.: An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks. [w:] Communications (ICC), 2010 IEEE International Conference on, Cape Town, South Afric, May 2010, s. 1-5
  • [21] Du X., Wang Y., Ge J., Wang Y.: An ID-based broadcast encryption scheme for key distribution. Broadcasting, IEEE Transactions on, vol. 51, No. 2, s. 264-266, Jun. 2005
  • [22] Tian B., Han S., Dillon T.S.: A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks. [w:] Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on, vol. 2, Shanghai, China, Dec. 2008, s. 208-215
  • [23] Han S., Tian B., Zhang Y., Hu J.: An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks. [w:] Communications (ICC), 2010 IEEE International Conference on, Cape Town, South Africa, May 2010, s. 1-5
  • [24] Jiang Y., Lin C., Shi M., Shen X.: Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Networks, vol. 5, No. 1, s. 14-23, 2007, Security Issues in Sensor and Ad Hoc Networks
  • [25] Dutta R., Chang E.-C., Mukhopadhyay S.: Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. [w:] Applied Cryptography and Network Security, J. Katz and M. Yung, Eds. Springer Berlin / Heidelberg, 2007, vol. 4521, s. 385-400
  • [26] ChunLai H.Z., Zhang W.: Anti-collusive Self-healing Key Distribution Scheme with Revocation Capability. Information Technology Journal, vol. 8, s. 619-624, 2009
  • [27] Tian B., Han S., Parvin S., Hu J., Das S.: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey. The Computer Journal, vol. 54, No. 4, s. 549-569, Mar. 2011
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-3855a1e4-705f-43c9-8754-cb24f4e2b4ff
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.