Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,613 Hits in 4.3 sec

Simultaneously Generating Secret and Private Keys in a Cooperative Pairwise-Independent Network

Peng Xu, Zhiguo Ding, Xuchu Dai, George K. Karagiannidis
2016 IEEE Transactions on Information Forensics and Security  
This paper studies the problem of simultaneously generating secret key (SK) and private key (PK) between Alice and Bob, in a cooperative pairwise independent network (PIN) with two relays.  ...  Two cooperative SK-PK generation algorithms are proposed: both of them first generate common randomness, based on the well-established pairwise key generation technique and application of the one-time  ...  Using these pairwise keys, the SK-PK generation scheme in Algorithms 1 and 2 can be utilized to simultaneously generate the secret key and private key shared by Alice and Bob.  ... 
doi:10.1109/tifs.2016.2516970 fatcat:uqhwdg2ypbg5lcbgadkno7xyra

The Private Key Capacity of a Cooperative Pairwise-Independent Network [article]

Peng Xu and Zhiguo Ding and Xuchu Dai
2015 arXiv   pre-print
This paper studies the private key generation of a cooperative pairwise-independent network (PIN) with M+2 terminals (Alice, Bob and M relays), M >= 2.  ...  Then, we consider a cooperative wireless network and use the estimates of fading channels to generate private keys.  ...  ACKNOWLEDGEMENTS The work of Peng Xu and Xuchu Dai was supported by the National Natural Science Foundation of China (NSFC) under grant number 61471334.  ... 
arXiv:1504.03411v1 fatcat:icsl4m457zg4hetegap3ool2lu

Pairwise Independent Key Generation Algorithm: A Survey

Nikita Gupta, Amit Saxena, Nakul Jain
2016 International Journal of Computer Applications  
Key Generation is a technique to provide a secure and efficient generation of Key Pairs so that the keys can't be attacked by the external or unauthorized users.  ...  Since there are various techniques implemented for the generation of keys such as based on Graphical Methods [  ...  High Storage Cost and Inefficient key generation. 4. The private Key Capacity of a Cooperative Pairwise- Independent Network. High storage capacity for secrete keys is required. 5.  ... 
doi:10.5120/ijca2016912468 fatcat:lelhbtthuvagzhwqcysl5nyuwu

On the private key capacity of the M-Relay pairwise independent network

Peng Xu, Zhiguo Ding, Xuchu Dai, George K. Karagiannidis
2016 Zenodo  
We study the problem of private key generation in a cooperative pairwise independent network (PIN), with M + 2 terminals (Alice, Bob, and M relays), M ≥ 2.  ...  Next, we consider a cooperative wireless network and use the estimates of fading channels to generate private keys.  ...  A PAIRWISE INDEPENDENT NETWORK Consider a cooperative DMS model with M + 2 terminals (Alice, Bob and M relays, M ≥ 2) and a passive eavesdropper (Eve).  ... 
doi:10.5281/zenodo.3690793 fatcat:aavhonurazbkjhsvm36jcwj5qe

Secret Key Generation for a Pairwise Independent Network Model

Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Prakash Narayan, Alex Reznik
2010 IEEE Transactions on Information Theory  
We consider secret key generation for a "pairwise independent network" model in which every pair of terminals observes correlated sources that are independent of sources observed by all other pairs of  ...  A (single-letter) formula for secret key capacity brings out a natural connection between the problem of secret key generation and a combinatorial problem of maximal packing of Steiner trees in an associated  ...  This model for SK generation, called a "pairwise independent network" model, was introduced in [23] (see also [22] ).  ... 
doi:10.1109/tit.2010.2081210 fatcat:usju27xfmjgfnauncf336qprge

Secret key generation for a pairwise independent network model

Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Prakash Narayan, Alex Reznik
2008 2008 IEEE International Symposium on Information Theory  
We consider secret key generation for a "pairwise independent network" model in which every pair of terminals observes correlated sources that are independent of sources observed by all other pairs of  ...  A (single-letter) formula for secret key capacity brings out a natural connection between the problem of secret key generation and a combinatorial problem of maximal packing of Steiner trees in an associated  ...  This model for SK generation, called a "pairwise independent network" model, was introduced in [23] (see also [22] ).  ... 
doi:10.1109/isit.2008.4595140 dblp:conf/isit/NitinawaratYBNR08 fatcat:n2pikexk3vhbficic7sz37rhsi

Secret Key Generation for a Pairwise Independent Network Model [article]

Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Prakash Narayan and Alex Reznik
2010 arXiv   pre-print
We consider secret key generation for a "pairwise independent network" model in which every pair of terminals observes correlated sources that are independent of sources observed by all other pairs of  ...  A (single-letter) formula for secret key capacity brings out a natural connection between the problem of secret key generation and a combinatorial problem of maximal packing of Steiner trees in an associated  ...  This model for SK generation, called a "pairwise independent network" model, was introduced in [23 ] (see also [22] ).  ... 
arXiv:1007.3518v2 fatcat:4jcosib64jhevij5ymu2sehqca

Energy-efficient, secure group key agreement for ad hoc networks

Thomas R. Halford, Thomas A. Courtade, Keith M. Chugg
2013 2013 IEEE Conference on Communications and Network Security (CNS)  
Unfortunately, while many ad hoc networking applications are dominated by multicast traffic, PKAs are inherently unicast: public/private key pairs are generated by data destinations.  ...  Public key cryptography is well-suited to ad hoc networks as it requires no a priori secure key distribution mechanism.  ...  Protocol Specification Given an n node network, a total of n 2 pairwise cryptographic master keys are generated and distributed to the network nodes such that each pairwise key is shared by exactly two  ... 
doi:10.1109/cns.2013.6682706 dblp:conf/cns/HalfordCC13 fatcat:2yelk3fcwffz7fg4sgeq3ljcpe

Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing

Mohamed Grissa, Attila A. Yavuz, Bechir Hamdaoui
2017 IEEE Transactions on Information Forensics and Security  
Our schemes can also adapt to the case of a malicious fusion center as we discuss in this paper.  ...  We also show that not only are our proposed schemes secure and more efficient than existing alternatives, but also achieve fault tolerance and are robust against sporadic network topological changes.  ...  (ii) It cannot handle dynamism if multiple users join or leave the network simultaneously. (iii) The pairwise secret sharing requirement incurs extra communication overhead and delay.  ... 
doi:10.1109/tifs.2016.2622000 fatcat:i37wj3nnsjg7bi6i3yf2wuonqe

Exchanging pairwise secrets efficiently

Iris Safaka, Christina Fragouli, Katerina Argyraki, Suhas Diggavi
2013 2013 Proceedings IEEE INFOCOM  
We consider the problem where a group of wireless nodes, connected to the same broadcast domain, want to create pairwise secrets, in the presence of an adversary Eve, who tries to listen in and steal these  ...  We propose a simple secret-agreement protocol, where the wireless nodes keep exchanging bits until they have agreed on pairwise secrets that Eve cannot reconstruct with very high probability.  ...  Also, it creates all the pairwise secrets simultaneously by harnessing the broadcast nature of wireless networks.  ... 
doi:10.1109/infcom.2013.6567030 dblp:conf/infocom/SafakaFAD13 fatcat:dbwypcqqvbe3dfb7lh4eiv4i2e

A survey of key management in ad hoc networks

Anne Marie Hegland, Eli Winjum, Stig F. Mjolsnes, Chunming Rong, Oivind Kure, Pal Spilling
2006 IEEE Communications Surveys and Tutorials  
The general assumption is that nodes in possession of a valid secret key can be trusted. Consequently, a secure and efficient key-management scheme is crucial.  ...  Keys are a prerequisite to bootstrap a protected network service.  ...  We also thank Leif Nilsen of the Univeristy of Oslo's University Graduate Centre/Thales Group Norway for valuable discussions and comments on our work. A special thanks to Prof.  ... 
doi:10.1109/comst.2006.253271 fatcat:zaobvvfiqzc2jovl7rozpplhxa

A Distributed Approach for Secure M2M Communications

Yosra Ben Saied, Alexis Olivereau, Maryline Laurent
2012 2012 5th International Conference on New Technologies, Mobility and Security (NTMS)  
A key establishment solution for heterogeneous Machine to Machine (M2M) communications is proposed.  ...  This paper proposes a novel collaborative session key exchange method, wherein a highly resourceconstrained node obtains assistance from its more powerful neighbors when handling costly cryptographic operations  ...  that owns a shared secret with all nodes in the sensor network and a public/private key pair.  ... 
doi:10.1109/ntms.2012.6208702 dblp:conf/ntms/SaiedOL12 fatcat:5h5vrrxdize6boosryxehj7fpq

A Survey on Group Key Management Schemes

R. Seetha, R. Saravanan
2015 Cybernetics and Information Technologies  
This paper presents a detailed survey on group key management and its challenges in network independent and network dependent approaches.  ...  Cryptographic key management needs utmost security in generating, exchanging, using, rekeying, storing of keys, being used for communication purposes.  ...  Conclusion The paper discusses various approaches of group key management both in network independent environment and network independent environment.  ... 
doi:10.1515/cait-2015-0038 fatcat:qhbtuqohyfd4hooxvixqouz6iy

A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks

Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo
2009 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks  
In this paper, a ConstrAined Random Perturbation-based pairwise keY establishment (CARPY) scheme and its variant, a CARPY+ scheme, for WSNs, are presented.  ...  Unfortunately, the resource limitation of sensor nodes poses a great challenge for designing an efficient and effective key establishment scheme for wireless sensor networks (WSNs).  ...  ACKNOWLEDGMENT Preliminary versions of portions of this paper were presented in [32] and [35] .  ... 
doi:10.1109/sahcn.2009.5168906 dblp:conf/secon/YuLK09 fatcat:w46zlk7juzhyhlt2gee6kal4z4

Noninteractive Pairwise Key Establishment for Sensor Networks

Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo
2010 IEEE Transactions on Information Forensics and Security  
In this paper, a ConstrAined Random Perturbation-based pairwise keY establishment (CARPY) scheme and its variant, a CARPY+ scheme, for WSNs, are presented.  ...  Unfortunately, the resource limitation of sensor nodes poses a great challenge for designing an efficient and effective key establishment scheme for wireless sensor networks (WSNs).  ...  ACKNOWLEDGMENT Preliminary versions of portions of this paper were presented in [32] and [35] .  ... 
doi:10.1109/tifs.2010.2050140 fatcat:uvrxvoms3zhjhemxyf4ltdkp54
« Previous Showing results 1 — 15 out of 1,613 results