In this paper, DES algorithm is implemented by applying pipelining concept to the key scheduling part. Using this implementation, it is possible to have the key length equal to data length;which further improves the s...
详细信息
While symmetric-key schemes are efficient in processing time for sensor networks, they generally require complicated key management, which may introduce large memory and communication overhead. On the contrary, public...
详细信息
ISBN:
(纸本)9781424431748
While symmetric-key schemes are efficient in processing time for sensor networks, they generally require complicated key management, which may introduce large memory and communication overhead. On the contrary, public-key based schemes have simple and clean key management, but cost more computational time. The recent progress of elliptic curve cryptography (ECC) implementation on sensors motivates us to design a public-key scheme and compare its performance with the symmetric-key counterparts. This paper builds the user access control on commercial off-the-shelf sensor devices as a case study to show that the public-key scheme can be more advantageous in terms of the memory, usage, message complexity, and security resilience. Meanwhile, our work also provides insights in integrating and designing public-key based security protocols for sensor networks.
Attack analysis acts as a center of gravity in network forensics to resolve the cyber crime cases. Nowadays, the cyber crime strategies have increasingly become more complicated in the digital world. This paper propos...
详细信息
The emergence of online social networks as an important media for communication and information dissemination during the last decade has also seen the increase in abuse of the media to spread misinformation, disinform...
详细信息
Ever increasing use of heterogeneous networks including mobile devices and ad-hoc sensor networks signifies the role of such information systems' properties as openness, autonomy, cooperation, coordination, etc. A...
详细信息
ISBN:
(纸本)9783540739852
Ever increasing use of heterogeneous networks including mobile devices and ad-hoc sensor networks signifies the role of such information systems' properties as openness, autonomy, cooperation, coordination, etc. Agent-based service-oriented Peer-to-Peer (P2P) architecture provides attractive (if not unique) design and implementation paradigm for such systems. This trend implies coherent evolution of securitysystems, that put in use the notions of distributedsecurity policy, distributed intrusion detection systems, etc.(1), requiring novel ideas. The paper proposes new architecture for such securitysystems. This architecture provides cooperative performance of distributedsecurity means (agents) supported by distributed meta-knowledge base implemented as an overlay network of instances of P2P agent platform set up on top of P2P networking provider. The paper also analyzes new issues of P2P securitysystems with the main emphasis on P2P training of security agents to correlation of alerts produced by other relevant agents. An artificially built case study is used to highlight the essence of P2P security agent training to P2P decision combining and to exhibit new problems.
Trust computation and management are significant areas of research in mobile ad hoc networks, since the mobile nodes are vulnerable to security threats. A trust mechanism allows the participating nodes to maintain tru...
详细信息
Cloud Computing is the recent buzz word in computing which has enormous potential to revolutionize the IT industry. Cloud opened up new computing scenarios coupled with many significant benefits, however they also tur...
详细信息
This book constitutes the refereed proceedings of the internationalconference on Parallel and distributed Computing and networks, PDCN 2011, held in Chongqing, China, in December 2010. The 19 revised full papers pres...
ISBN:
(数字)9783642227066
ISBN:
(纸本)9783642227059
This book constitutes the refereed proceedings of the internationalconference on Parallel and distributed Computing and networks, PDCN 2011, held in Chongqing, China, in December 2010. The 19 revised full papers presented were carefully reviewed and selected from numerous submissions. The conference provided a forum for participants from industry, academic, and non-profit organizations to exchange innovative ideas on Parallel and distributed Computing and networks related technologies. The papers address current issues in distributed, parallel, ubiquitous, and cloud computing with special focus on systemssecurity, healthcare, and sports economics.
Vernam cipher is said to be one of the most secure cipher systems in use, based on the key size. It is derived from the One-Time Pad (OTP) method. One of the main features of the cipher is that it is completely revers...
详细信息
The rich literature available for key management schemes for Secure Group Communication focuses on operating only a single group. We consider the operation of simultaneous/concurrent multiple groups in the Secure Grou...
详细信息
暂无评论