Generalized hash-binary-tree based self-healing key distribution with implicit authentication
MetadataShow full item record
We propose a self-healing key distribution scheme with implicit authentication following a hash-binary-tree based key distribution scheme. The scheme reduces storage overhead without increase of communication and computation overhead. Implication authentication is subtly introduced to detect tamper attack against broadcast messages during transmission. The scheme achieves the same security level with Dutta et al’s approach which is an improved version of one of our schemes. The security of the proposed scheme is analyzed under an security model.
Showing items related by title, author, creator and subject.
Tian, Biming; Han, Song; Parvin, Sazia; Hu, J.; Das, S. (2011)The objective of self-healing key distribution is to enable group users to recover session keys by themselves, without requesting additional transmissions from the group manager (GM), even when they miss some broadcast ...
Rong, Yue; Hua, Y. (2008)Power control, beamforming and link scheduling are all important operations to improve the power-and-spectral efficiency of networks of multiple-input multiple-output (MIMO) wireless links. We call a joint optimization ...
Chai, Pey San Nancy (2011)Backhaul networks are used to interconnect access points and further connect them to gateway nodes which are located in regional or metropolitan centres. Conventionally, these backhaul networks are established using ...