Downloads: 106 | Views: 281
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014 | Popularity: 6.5 / 10
Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks
P. Harikrishna, K. V. Srinivasa Rao
Abstract: The difficulty of effectively and securely broadcasting to a remote cooperative group happens in many freshly appearing networks. A foremost dispute in developing such systems is to over whelm the obstacles of the potentially restricted connection from the assembly to the sender, the unavailability of a completely trusted key generation center, and the dynamics of the sender. The novel, living key administration paradigms cannot deal with these trials effectively. In this paper, we circumvent these obstacles and close this gap by suggesting a innovative key administration paradigm. The new paradigm is a hybrid of customary broadcast encryption and assembly key agreement. In such a scheme, each constituent sustains a single public/secret key two. Upon seeing the public keys of the members, a isolated sender can securely broadcast to any proposed subgroup selected in an publicity hoc way. Following this form, we instantiate a scheme that is verified protected in the standard form. Even if all the no proposed constituents collude, they will not extract any helpful data from the conveyed messages. After the public assembly encryption key is extracted, both the computation overhead and the connection cost are independent of the group dimensions. Furthermore, our scheme facilitates easy yet efficient member deletion/addition and flexible rekeying schemes. Its powerful security against collusion, its unchanging overhead, and its implementation friendliness without relying on a fully trusted administration render our protocol a very under taking solution to many applications.
Keywords: Ad hoc networks, broadcast, cooperative computing, access control, information security, key management
Edition: Volume 3 Issue 10, October 2014
Pages: 781 - 785
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1349 - 1363IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing
Ponnarasan Krishnan
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 11, November 2024
Pages: 844 - 850Data-Driven Decision Making: Advanced Database Systems for Business Intelligence
Maria Anurag Reddy Basani, Anudeep Kandi
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Student Project, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 306 - 309A Basic Framework for Policy Updates for the Outsourced Exchange of Private Medical Records
V. Jayaganesh