An efficient self-healing key distribution scheme
dc.contributor.author | Tian, Biming | |
dc.contributor.author | Han, Song | |
dc.contributor.author | Dillon, Tharam S. | |
dc.contributor.editor | A. Aggarwal | |
dc.contributor.editor | M. Badra | |
dc.contributor.editor | F. Massacci | |
dc.date.accessioned | 2017-01-30T14:42:42Z | |
dc.date.available | 2017-01-30T14:42:42Z | |
dc.date.created | 2009-02-10T18:02:16Z | |
dc.date.issued | 2008 | |
dc.identifier.citation | Tian, Biming and Han, Song and Dillon, Tharam S. 2008. An efficient self-healing key distribution scheme, in Aggarwal, A. and Badra, M. and Massacci, F. (ed), Second IFIP International Conference on New Technologies, Mobility and Security, Nov 5 2008, pp. 1-5. Tangier, Morocco: Institute of Electrical and Electronics Engineers (IEEE) | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/40440 | |
dc.identifier.doi | 10.1109/NTMS.2008.ECP.18 | |
dc.description.abstract |
Self-healing key distribution schemes enable a group user to recover session keys from two broadcast messages he received before and after those sessions, even if the broadcast messages for the middle sessions are lost due to network failure. These schemes are quite suitable in supporting secure communication over unreliable networks such as sensor networks and ad hoc networks. An efficient self-healing key distribution scheme is proposed in this paper. The scheme bases on the concept of access polynomial and self-healing key distribution model constructed by Hong et al. The new scheme reduces communication and computation overheads greatly yet still keeps the constant storageoverhead. | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.subject | key distribution | |
dc.subject | group communication | |
dc.subject | Self-healing | |
dc.title | An efficient self-healing key distribution scheme | |
dc.type | Conference Paper | |
dcterms.source.startPage | 1 | |
dcterms.source.endPage | 5 | |
dcterms.source.title | Proceedings of the 2nd IFIP international conference on new technologies, mobility and security (NTMS 2008) | |
dcterms.source.series | Proceedings of the 2nd IFIP international conference on new technologies, mobility and security (NTMS 2008) | |
dcterms.source.isbn | 9781424435470 | |
dcterms.source.conference | 2nd IFIP International Conference on New Technologies, Mobility and Security (NTMS 2008) | |
dcterms.source.conference-start-date | 5 Nov 2008 | |
dcterms.source.conferencelocation | Tangier, Morocco | |
dcterms.source.place | Morocco | |
curtin.note |
Copyright © 2008 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |