Jehangir et al., 2007 - Google Patents
Securing personal network clustersJehangir et al., 2007
View PDF- Document ID
- 10216023676618634772
- Author
- Jehangir A
- De Groot S
- Publication year
- Publication venue
- 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops-SecureComm 2007
External Links
Snippet
A Personal Network is a self-organizing, secure and private network of a user's devices notwithstanding their geographic location. It aims to utilize pervasive computing to provide users with new and improved services. In this paper we propose a model for securing …
- 238000004891 communication 0 abstract description 27
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cheikhrouhou | Secure group communication in wireless sensor networks: a survey | |
JP4551202B2 (en) | Ad hoc network authentication method and wireless communication terminal thereof | |
Zhu et al. | LEAP+ Efficient security mechanisms for large-scale distributed sensor networks | |
US8254581B2 (en) | Lightweight key distribution and management method for sensor networks | |
Rajeswari et al. | Comparative study on various authentication protocols in wireless sensor networks | |
Boyle et al. | Security protocols for use with wireless sensor networks: A survey of security architectures | |
Erfani et al. | A dynamic key management scheme for dynamic wireless sensor networks | |
Benamar et al. | An efficient key management scheme for hierarchical wireless sensor networks | |
Yang et al. | Improved handover authentication and key pre‐distribution for wireless mesh networks | |
Singh et al. | An efficient secure key establishment method in cluster-based sensor network | |
Aissani et al. | µKMS: micro key management system for WSNs | |
Yao et al. | A-CACHE: An anchor-based public key caching scheme in large wireless networks | |
Sangwan et al. | A Review of various security protocols in Wireless Sensor Network | |
Tian et al. | Towards enhanced key management in multi-phase ZigBee network architecture | |
Jehangir et al. | Securing personal network clusters | |
Liu et al. | Data security in unattended wireless sensor networks with mobile sinks | |
Guermazi et al. | An efficient key distribution scheme to secure data-centric routing protocols in hierarchical wireless sensor networks | |
Mamun et al. | A key management scheme for establishing an encryption-based trusted iot system | |
Jehangir et al. | A Security architecture for personal networks | |
Kim et al. | A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks | |
Aseri et al. | Enhanced Security Protocol in Wireless Sensor Networks | |
Beyah et al. | Security in Ad-hoc and Sensor Networks | |
Verma et al. | Progressive authentication in ad hoc networks | |
Nasiraee et al. | A novel three party key establishment scheme in the context of Internet-of-Things | |
Gaur et al. | Polynomial based scheme (pbs) for establishing authentic associations in wireless mesh networks |