Results 1 - 10
of
60,208
Table 1. Classification of key management schemes
"... In PAGE 2: ... If the computation and communication costs at the sender increases linearly with the size of the multicast group, then the scheme is considered to be non-scalable. Table1 lists the key management schemes according to the new criteria. Table 1.... In PAGE 2: ...Among the schemes listed in Table1 , three scalable schemes, namely, the Centralized Tree-Based Key Management (CTKM) [6], Iolus [23] and DEP [24] are compared through simulation using real-life multicast group membership traces [37]. The performance metrics used in this comparison are (1) the encryption cost at the sender, and (2) encryption/decryption cost at the members and subgroup managers.... ..."
Table 1: Comparison of Key Management schemes
in CRTDH: An Efficient Key Agreement Scheme for Secure Group Communications in Wireless Ad Hoc Networks
Table 2: Comparisons of the proposed protocols Conventional challenge-response scheme Our scheme More efficient key management no yes
2006
"... In PAGE 5: ... As a result of the previous comparisons, the new scheme has proven its superiority in key management, se- curity enhancement and access rights management over conventional challenge-response protocols. Table2 gives a summary of these results. 5 Conclusions The introduction of the self-concealing mechanism can spare the requirement of a bulky database for the shared keys.... ..."
Table 3 Comparison of key management protocols for ASN Schemes Applicable to
2003
"... In PAGE 11: ... One drawback of this scheme is that some wireless links may not be keyed and thus a node may need to use a multi-link path to com- municate with one of its neighbor nodes. Table3 compares the characteristics of the abovementioned key management protocols from the points of view of: (1) Level of its applicability to ASN; (2) Power saving; (3) Storage require- ments; (4) Key distribution latency; (5) Colla- Table 3 Comparison of key management protocols for ASN Schemes Applicable to... ..."
Table 4. Key management schemes for mobile ad hoc networks.
in Abstract
"... In PAGE 31: ... By fabricating and forwarding route error messages an attacker can try to disrupt the operation of existing routes, not only breaking connectivity but also creating additional routing overhead in the network as a result of legitimate nodes trying to establish alternative paths. In Table4 we present the route maintenance characteristics of the protocols we have analyzed. The solution adopted by most of the analyzed protocols requires the signing of the complete error message by the node that generates or forwards it.... In PAGE 33: ... In this section we will present several key management solutions that have been specifically proposed to address the challenges of mobile ad hoc networks and discuss their behavior in respect to mobility patterns and operational requirements. Table4 summarizes the results of our analysis. Table 4.... ..."
TABLE VIII Hierarchies supported by different key management schemes.
TABLE IX Suitability of key management schemes for hierarchy change.
TABLE I VULNERABILITY OF PREVAIL CENTRALIZED KEY MANAGEMENT SCHEMES
TABLE III Comparison of Distributed Key Management Protocols Scheme Nb. rounds Nb. messages DH exchange Leader required
Table 1 Key management functions in static and dynamic keying. (Admin. Keys assumed) Static keying Dynamic keying
"... In PAGE 3: ... While static schemes primarily assume that administrative keys will outlive the network and emphasize pair-wise communication keys, dynamic schemes advocate re-keying to achieve attack resiliency in long-lived networks and emphasizes group communication keys. Table1 shows the primary differences be- tween static and dynamic keying in performing key management functions. Mohar- ram and Eltoweissy [17] provide a performance and security comparison between static and dynamic keying.... ..."
Results 1 - 10
of
60,208