Articles with "key management" as a keyword



Photo by papaioannou_kostas from unsplash

Host mobility key management in dynamic secure group communication

Sign Up to like & get
recommendations!
Published in 2018 at "Wireless Networks"

DOI: 10.1007/s11276-017-1511-4

Abstract: The key management has a fundamental role in securing group communications taking place over vast and unprotected networks. It is concerned with the distribution and update of the keying materials whenever any changes occur in… read more here.

Keywords: mobility; wireless mobile; group; key management ... See more keywords
Photo by papaioannou_kostas from unsplash

An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3366-x

Abstract: Secure group communication is desired in many group oriented applications of mobile ad hoc network (MANET), and fruitful communication achieved only via trustable network environment. In order to enhance the privacy among group members, proper… read more here.

Keywords: manet; communication; group; management ... See more keywords
Photo by lensingmyworld from unsplash

MANET Security Betterment by Enhanced Multiple Key Management Scheme

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3368-8

Abstract: Creating and accessing multiple groups with various validations in Mobile Ad hoc Networks (MANET) is getting popular these days. Providing privacy as well as accessibility at the same time is a challenging process because the… read more here.

Keywords: management scheme; enhanced multiple; management; key management ... See more keywords
Photo from wikipedia

Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems

Sign Up to like & get
recommendations!
Published in 2020 at "Sustainable Cities and Society"

DOI: 10.1016/j.scs.2020.102416

Abstract: Abstract Internet of Things (IoT) utilizes an intelligent technique to facilitate the design and development of smart-urban projects. As the smart devices have limited battery sources, IoT services should initiate its setup with low-power consumption.… read more here.

Keywords: iot; smart iot; authentication key; mobile sink ... See more keywords
Photo from wikipedia

Key Management for Beyond 5G Mobile Small Cells: A Survey

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2914359

Abstract: The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders are unanimous that densification of mobile networks is the way forward. The densification will be realized by means of small cell… read more here.

Keywords: key management; small cells; mobile small; network ... See more keywords
Photo from wikipedia

On the Development of a Protection Profile Module for Encryption Key Management Components

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3239043

Abstract: The ability of a cryptographic system to protect information from attacks depends on many factors, including the secrecy of the encryption key. A crucial aspect of any cryptosystem is how it manages the encryption keys.… read more here.

Keywords: encryption key; security; protection profile; key management ... See more keywords
Photo from wikipedia

Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2017.2740569

Abstract: As modern vehicle and communication technologies advanced apace, people begin to believe that the Intelligent Transportation System (ITS) would be achievable in one decade. ITS introduces information technology to the transportation infrastructures and aims to… read more here.

Keywords: framework; management heterogeneous; key management; management ... See more keywords
Photo by thinkmagically from unsplash

A Secure Scheme Based on One-Way Associated Key Management Model in Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2020.3021740

Abstract: To achieve security in wireless sensor networks (WSNs), it is important to be able to encrypt messages sent among sensor nodes by using shared keys between them. Due to resource constraints, achieving such key agreement… read more here.

Keywords: key management; wireless sensor; model; sensor ... See more keywords
Photo by joelfilip from unsplash

Intelligent Trust-Based Public-Key Management for IoT by Linking Edge Devices in a Fog Architecture

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2020.3027536

Abstract: Due to memory and processing limitations, Internet-of-Things (IoT) devices require external fog servers to perform some of their tasks. However, this offloading of tasks comes at the cost of more interactions whose security cannot be… read more here.

Keywords: iot; devices fog; key management; management ... See more keywords
Photo from wikipedia

AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber–Physical Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3109314

Abstract: This article proposes a new blockchain-envisioned key management protocol for artificial intelligence (AI)-enabled industrial cyber–physical systems (ICPSs). The designed key management protocol enables key establishment among the Internet of Things (IoT)-enabled smart devices and their… read more here.

Keywords: blockchain; industrial cyber; key management; physical systems ... See more keywords
Photo by flyd2069 from unsplash

STYX: A Hierarchical Key Management System for Elastic Content Delivery Networks on Public Clouds

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2019.2918278

Abstract: Hosting content delivery networks (CDNs) on clouds has the potential to improve the performance as resources and caches can be placed closer to subscribers. However, avoiding data leakage over an untrusted public cloud is critical,… read more here.

Keywords: key management; management; management system; hierarchical key ... See more keywords