Key Management Technique

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 195 Experts worldwide ranked by ideXlab platform

Kouchui Sakurai - One of the best experts on this subject based on the ideXlab platform.

  • secure and privacy preserving hierarchical wireless sensor networks using hybrid Key Management Technique
    Global Communications Conference, 2013
    Co-Authors: Sushmita Ruj, Kouchui Sakurai
    Abstract:

    We propose a Key Management scheme for two-tire hierarchical mobile network using triple Key distribution. Sensor nodes are divided into clusters managed by cluster heads which collect and aggregate data and send to base stations. The use of both symmetric and public Key Techniques makes the network highly resilient to node compromise. The nodes are resource constrained and thus communicate securely using symmetric triple Key distribution Technique. The cluster heads are powerful and use asymmetric Key distribution Techniques. The anonymity of cluster heads while forwarding messages is also preserved in our protocol. To the best of our knowledge, this is the first Key Management scheme which uses both symmetric and asymmetric triple Key distribution mechanism. The analysis shows that our scheme is highly secure, preserves privacy of cluster heads and can support efficient addition and deletion of nodes.

  • GLOBECOM - Secure and privacy preserving hierarchical wireless sensor networks using hybrid Key Management Technique
    2013 IEEE Global Communications Conference (GLOBECOM), 2013
    Co-Authors: Sushmita Ruj, Kouchui Sakurai
    Abstract:

    We propose a Key Management scheme for two-tire hierarchical mobile network using triple Key distribution. Sensor nodes are divided into clusters managed by cluster heads which collect and aggregate data and send to base stations. The use of both symmetric and public Key Techniques makes the network highly resilient to node compromise. The nodes are resource constrained and thus communicate securely using symmetric triple Key distribution Technique. The cluster heads are powerful and use asymmetric Key distribution Techniques. The anonymity of cluster heads while forwarding messages is also preserved in our protocol. To the best of our knowledge, this is the first Key Management scheme which uses both symmetric and asymmetric triple Key distribution mechanism. The analysis shows that our scheme is highly secure, preserves privacy of cluster heads and can support efficient addition and deletion of nodes.

Vahid Kaviani - One of the best experts on this subject based on the ideXlab platform.

  • Efficient high-rate Key Management Technique for wireless body area networks
    2016 22nd Asia-Pacific Conference on Communications (APCC), 2016
    Co-Authors: Ahmad S. Salehi, Mohammed Abdur Razzaque, Inmaculada Tomeo-reyes, Nasir Hussain, Vahid Kaviani
    Abstract:

    Wireless body area network (WBAN) is an emerging technology that focuses on healthcare monitoring in indoor and outdoor areas. WBAN technology allows medical sensors to collect vital physiological data and transfer it from a source to a destination via low-energy communication. To be able to encrypt and decrypt healthcare data, it is important for medical sensing and health-related devices to generate and extract the same secret Keys at both end points. Recent studies show that two medical sensing devices can generate and share secret Keys using their wireless channel properties, such as the received signal strength indicator (RSSI). However, existing approaches have low bit rate values and the Key entropy is insufficient. These limitations pose a major threat to WBANs and must be addressed. In this paper, we first provide an overview of existing studies related to Key extraction between two devices. We then describe the basic principles of wireless channel properties and the Key parameters needed to generate secret Keys. Finally, we propose a practical scheme to generate secret Keys while avoiding information reconciliation and privacy amplification. The proposed scheme can generate 128 symmetric secret Keys in a short time frame, and allows to secure the communication between sensor devices and improve the quality of services in WBANs.

  • APCC - Efficient high-rate Key Management Technique for wireless body area networks
    2016 22nd Asia-Pacific Conference on Communications (APCC), 2016
    Co-Authors: S. Ahmad Salehi, Inmaculada Tomeo-reyes, Nasir Hussain, Mohammad Abdur Razzaque, Vahid Kaviani
    Abstract:

    Wireless body area network (WBAN) is an emerging technology that focuses on healthcare monitoring in indoor and outdoor areas. WBAN technology allows medical sensors to collect vital physiological data and transfer it from a source to a destination via low-energy communication. To be able to encrypt and decrypt healthcare data, it is important for medical sensing and health-related devices to generate and extract the same secret Keys at both end points. Recent studies show that two medical sensing devices can generate and share secret Keys using their wireless channel properties, such as the received signal strength indicator (RSSI). However, existing approaches have low bit rate values and the Key entropy is insufficient. These limitations pose a major threat to WBANs and must be addressed. In this paper, we first provide an overview of existing studies related to Key extraction between two devices. We then describe the basic principles of wireless channel properties and the Key parameters needed to generate secret Keys. Finally, we propose a practical scheme to generate secret Keys while avoiding information reconciliation and privacy amplification. The proposed scheme can generate 128 symmetric secret Keys in a short time frame, and allows to secure the communication between sensor devices and improve the quality of services in WBANs.

Sushmita Ruj - One of the best experts on this subject based on the ideXlab platform.

  • secure and privacy preserving hierarchical wireless sensor networks using hybrid Key Management Technique
    Global Communications Conference, 2013
    Co-Authors: Sushmita Ruj, Kouchui Sakurai
    Abstract:

    We propose a Key Management scheme for two-tire hierarchical mobile network using triple Key distribution. Sensor nodes are divided into clusters managed by cluster heads which collect and aggregate data and send to base stations. The use of both symmetric and public Key Techniques makes the network highly resilient to node compromise. The nodes are resource constrained and thus communicate securely using symmetric triple Key distribution Technique. The cluster heads are powerful and use asymmetric Key distribution Techniques. The anonymity of cluster heads while forwarding messages is also preserved in our protocol. To the best of our knowledge, this is the first Key Management scheme which uses both symmetric and asymmetric triple Key distribution mechanism. The analysis shows that our scheme is highly secure, preserves privacy of cluster heads and can support efficient addition and deletion of nodes.

  • GLOBECOM - Secure and privacy preserving hierarchical wireless sensor networks using hybrid Key Management Technique
    2013 IEEE Global Communications Conference (GLOBECOM), 2013
    Co-Authors: Sushmita Ruj, Kouchui Sakurai
    Abstract:

    We propose a Key Management scheme for two-tire hierarchical mobile network using triple Key distribution. Sensor nodes are divided into clusters managed by cluster heads which collect and aggregate data and send to base stations. The use of both symmetric and public Key Techniques makes the network highly resilient to node compromise. The nodes are resource constrained and thus communicate securely using symmetric triple Key distribution Technique. The cluster heads are powerful and use asymmetric Key distribution Techniques. The anonymity of cluster heads while forwarding messages is also preserved in our protocol. To the best of our knowledge, this is the first Key Management scheme which uses both symmetric and asymmetric triple Key distribution mechanism. The analysis shows that our scheme is highly secure, preserves privacy of cluster heads and can support efficient addition and deletion of nodes.

S. Ahmad Salehi - One of the best experts on this subject based on the ideXlab platform.

  • APCC - Efficient high-rate Key Management Technique for wireless body area networks
    2016 22nd Asia-Pacific Conference on Communications (APCC), 2016
    Co-Authors: S. Ahmad Salehi, Inmaculada Tomeo-reyes, Nasir Hussain, Mohammad Abdur Razzaque, Vahid Kaviani
    Abstract:

    Wireless body area network (WBAN) is an emerging technology that focuses on healthcare monitoring in indoor and outdoor areas. WBAN technology allows medical sensors to collect vital physiological data and transfer it from a source to a destination via low-energy communication. To be able to encrypt and decrypt healthcare data, it is important for medical sensing and health-related devices to generate and extract the same secret Keys at both end points. Recent studies show that two medical sensing devices can generate and share secret Keys using their wireless channel properties, such as the received signal strength indicator (RSSI). However, existing approaches have low bit rate values and the Key entropy is insufficient. These limitations pose a major threat to WBANs and must be addressed. In this paper, we first provide an overview of existing studies related to Key extraction between two devices. We then describe the basic principles of wireless channel properties and the Key parameters needed to generate secret Keys. Finally, we propose a practical scheme to generate secret Keys while avoiding information reconciliation and privacy amplification. The proposed scheme can generate 128 symmetric secret Keys in a short time frame, and allows to secure the communication between sensor devices and improve the quality of services in WBANs.

Dinesh Anvekar - One of the best experts on this subject based on the ideXlab platform.

  • An optimized security solution based on trust value for multithreaded wireless body area network communication
    International Journal of Pervasive Computing and Communications, 2019
    Co-Authors: Sanchari Saha, Dinesh Anvekar
    Abstract:

    Purpose Security of wireless body area network communication is highly important as it directly impacts human life. This paper aims to focus on battlefield application area of WBAN for implementing security where data must be protected against various possible attacks before delivering over a public network. Design/methodology/approach Providing a strong security system is still a research challenge due to low computational power of used sensors for protecting transmission data. In this paper, the authors have proposed an optimized security solution for multithreaded wireless body area network (MWBAN) using trust-based distributed group Key Management Technique to overcome the drawbacks of existing elliptical curve cryptography-homomorphism (ECC-Homomorphism) scheme as well as coded cooperative data exchange group Key Management (CCDE_GKM) scheme. Findings The proposed optimized security solution is implemented for a particular deployment strategy and test runs are conducted. It is found that when number of attack nodes increased to 25, compared to ECC–Homomorphism and CCDE_GKM for the proposed trust-based distributed group Key Management Technique there is an improvement in performance parameters such as throughput is dropped to only 10.11 Kbps, average delay is just 3.4 s, energy consumption is maximum 29 joules, packet loss is only 12.3 per cent, 90.9 per cent truly can detect attack, only 8.9 per cent false attack detection and 84 per cent true negative detection. Social implications Medical care can be provided to human beings with much ease and flexibility via remote monitoring. The user can be at any place, can do his/her everyday work while remotely being monitored of their health parameters and secured transmission of their data to the health-care center for medical service in need. Originality/value This paper presents an optimized security solution for MWBAN using trust-based distributed group Key Management Technique where bilinear pairing theory is used as major cryptographic base. Optimal Key is selected based on trust value and also attack nodes are detected based on trust value to control participation in communication.

  • A Comparative Study of Cryptographic Techniques for Multithreaded Wireless Body Area Network Security
    2019
    Co-Authors: Sanchari Saha, Dinesh Anvekar
    Abstract:

    In last decade, wireless sensor networks (WSN) paved the way for various possible application areas including monitoring a person’s health, environment remotely. This opened up the development of wireless body area network (WBAN)-an emerging area towards remote healthcare. Due to aging population there is an  increasing demand of medical care which can serve patients at their doorstep. WBAN satisfies this demand with low cost and flexibility. The working nature of WBAN doesn’t restrict its users from day to day activities and due to its mobile nature, it has gained popularity in healthcare in a very short span of time. The Key components of this wireless body area network are sensors which are placed either implanted inside or on the surface of human body.  These sensors produce huge amount of real time sensed data.  The major research challenge faced by WBAN is data transmission security. In medical care centers theses sensitive data should be protected from various kinds of security risks like data theft, unauthenticated data insertion and manipulation, confidentiality breach etc. In this paper we have proposed a ‘Trust based distributed group Key ManagementTechnique  to secure multithreaded WBAN data where data is collected from multiple working WBANs  and sent to medical server. This proposed approach is then compared with two well-known Key Management Techniques  called  ‘ECC-Homomorphism’ and  ‘CCDE-GKM’ ( Coded Cooperative Group Key Management ) in detail.