Generalized hash-binary-tree based self-healing key distribution with implicit authentication
MetadataShow full item record
We propose a self-healing key distribution scheme with implicit authentication following a hash-binary-tree based key distribution scheme. The scheme reduces storage overhead without increase of communication and computation overhead. Implication authentication is subtly introduced to detect tamper attack against broadcast messages during transmission. The scheme achieves the same security level with Dutta et al’s approach which is an improved version of one of our schemes. The security of the proposed scheme is analyzed under an security model.
Showing items related by title, author, creator and subject.
Tian, Biming; Han, Song; Parvin, Sazia; Hu, J.; Das, S. (2011)The objective of self-healing key distribution is to enable group users to recover session keys by themselves, without requesting additional transmissions from the group manager (GM), even when they miss some broadcast ...
Compressive network coding for wireless sensor networks: Spatio-temporal coding and optimization designChen, S.; Zhao, C.; Wu, M.; Sun, Zhonghua; Zhang, H.; Leung, V. (2016)© 2016 Elsevier B.V. Considering the temporal and spatial correlations of sensor readings in wireless sensor networks (WSNs), this paper develops a clustered spatio-temporal compression scheme by integrating network coding ...
Rong, Yue; Hua, Y. (2008)Power control, beamforming and link scheduling are all important operations to improve the power-and-spectral efficiency of networks of multiple-input multiple-output (MIMO) wireless links. We call a joint optimization ...