Secure Communication

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 69243 Experts worldwide ranked by ideXlab platform

Jongin Lim - One of the best experts on this subject based on the ideXlab platform.

  • ICECS - Fast Secure Communication Establishing Mechanism for Aero-wireless Networks
    2007 14th IEEE International Conference on Electronics Circuits and Systems, 2007
    Co-Authors: Ki-hong Kim, Jinkeun Hong, Jongin Lim
    Abstract:

    Secure Communication reestablishment together with fast secret materials generations are key points in terms of the quality and performance of Secure aero-wireless networks. In this paper, a fast Secure Communication reestablishing mechanism for Secure aero-wireless networks is initially presented. The performance in terms of the consumed time and bit error rate (BER) while reestablishing Secure Communication using the proposed mechanism is then analyzed and compared. Our proposed mechanism is found to achieve better performance than that of conventional mechanism.

  • MUE - Approach of the Secure Communication Mechanism in Aero-wireless Environment
    2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07), 2007
    Co-Authors: Ki-hong Kim, Jinkeun Hong, Jongin Lim
    Abstract:

    Aero-wireless network is a wireless environment between aircraft stations and ground stations, or between aircraft stations. Secure Communications in aero-wireless network are inherently unreliable and discontinuous resulting infrequent encrypted data losses/insertions. If an encrypted data is lost or inserted, a new Secure connection can be setup without complex cryptographic computations. This work focuses on one important attention of aero-wireless network, namely, Secure Communication restart and how it works after encrypted data loss/insertion in Communication channel. In this paper, we first present a Secure Communication restarting mechanism for an aero-wireless network. We then compare and analyze the processing time and bit error rate (BER) while restarting a Secure Communication using proposed mechanism. To our knowledge, this is the first proposal and comprehensive analysis of the Secure Communication restarting mechanism in aero-wireless networks. Our results can be used to design technique of efficient Secure Communication for aero-wireless networks.

  • DEXA - Analysis of the power consumption of Secure Communication in wireless networks
    Lecture Notes in Computer Science, 2006
    Co-Authors: Ki-hong Kim, Jinkeun Hong, Jongin Lim
    Abstract:

    With the growth of the Internet, Communication and network security have been the focus of much attention. In addition, deployment of resource intensive security protocols in battery-powered mobile devices has raised power consumption to a significant design basis of network design. In this paper, we propose a power-efficient Secure Communication restart mechanism for a wireless network and analyze the power consumed while restarting a Secure Communication. An experimental test bed was developed to inspect the proposed mechanism and to evaluate it in terms of power consumption relative to that of conventional Secure Communication restart mechanisms. Using our enhanced mechanism, we were able to reduce the power consumed during a Secure Communication restart by up to 60% compared with conventional restart mechanisms.

  • Analysis of the power consumption of Secure Communication in wireless networks
    Lecture Notes in Computer Science, 2006
    Co-Authors: Ki-hong Kim, Jinkeun Hong, Jongin Lim
    Abstract:

    With the growth of the Internet, Communication and network security have been the focus of much attention. In addition, deployment of resource intensive security protocols in battery-powered mobile devices has raised power consumption to a significant design basis of network design. In this paper, we propose a power-efficient Secure Communication restart mechanism for a wireless network and analyze the power consumed while restarting a Secure Communication. An experimental test bed was developed to inspect the proposed mechanism and to evaluate it in terms of power consumption relative to that of conventional Secure Communication restart mechanisms. Using our enhanced mechanism, we were able to reduce the power consumed during a Secure Communication restart by up to 60% compared with conventional restart mechanisms.

Ki-hong Kim - One of the best experts on this subject based on the ideXlab platform.

  • ICECS - Fast Secure Communication Establishing Mechanism for Aero-wireless Networks
    2007 14th IEEE International Conference on Electronics Circuits and Systems, 2007
    Co-Authors: Ki-hong Kim, Jinkeun Hong, Jongin Lim
    Abstract:

    Secure Communication reestablishment together with fast secret materials generations are key points in terms of the quality and performance of Secure aero-wireless networks. In this paper, a fast Secure Communication reestablishing mechanism for Secure aero-wireless networks is initially presented. The performance in terms of the consumed time and bit error rate (BER) while reestablishing Secure Communication using the proposed mechanism is then analyzed and compared. Our proposed mechanism is found to achieve better performance than that of conventional mechanism.

  • MUE - Approach of the Secure Communication Mechanism in Aero-wireless Environment
    2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07), 2007
    Co-Authors: Ki-hong Kim, Jinkeun Hong, Jongin Lim
    Abstract:

    Aero-wireless network is a wireless environment between aircraft stations and ground stations, or between aircraft stations. Secure Communications in aero-wireless network are inherently unreliable and discontinuous resulting infrequent encrypted data losses/insertions. If an encrypted data is lost or inserted, a new Secure connection can be setup without complex cryptographic computations. This work focuses on one important attention of aero-wireless network, namely, Secure Communication restart and how it works after encrypted data loss/insertion in Communication channel. In this paper, we first present a Secure Communication restarting mechanism for an aero-wireless network. We then compare and analyze the processing time and bit error rate (BER) while restarting a Secure Communication using proposed mechanism. To our knowledge, this is the first proposal and comprehensive analysis of the Secure Communication restarting mechanism in aero-wireless networks. Our results can be used to design technique of efficient Secure Communication for aero-wireless networks.

  • DEXA - Analysis of the power consumption of Secure Communication in wireless networks
    Lecture Notes in Computer Science, 2006
    Co-Authors: Ki-hong Kim, Jinkeun Hong, Jongin Lim
    Abstract:

    With the growth of the Internet, Communication and network security have been the focus of much attention. In addition, deployment of resource intensive security protocols in battery-powered mobile devices has raised power consumption to a significant design basis of network design. In this paper, we propose a power-efficient Secure Communication restart mechanism for a wireless network and analyze the power consumed while restarting a Secure Communication. An experimental test bed was developed to inspect the proposed mechanism and to evaluate it in terms of power consumption relative to that of conventional Secure Communication restart mechanisms. Using our enhanced mechanism, we were able to reduce the power consumed during a Secure Communication restart by up to 60% compared with conventional restart mechanisms.

  • Analysis of the power consumption of Secure Communication in wireless networks
    Lecture Notes in Computer Science, 2006
    Co-Authors: Ki-hong Kim, Jinkeun Hong, Jongin Lim
    Abstract:

    With the growth of the Internet, Communication and network security have been the focus of much attention. In addition, deployment of resource intensive security protocols in battery-powered mobile devices has raised power consumption to a significant design basis of network design. In this paper, we propose a power-efficient Secure Communication restart mechanism for a wireless network and analyze the power consumed while restarting a Secure Communication. An experimental test bed was developed to inspect the proposed mechanism and to evaluate it in terms of power consumption relative to that of conventional Secure Communication restart mechanisms. Using our enhanced mechanism, we were able to reduce the power consumed during a Secure Communication restart by up to 60% compared with conventional restart mechanisms.

Jinkeun Hong - One of the best experts on this subject based on the ideXlab platform.

  • ICECS - Fast Secure Communication Establishing Mechanism for Aero-wireless Networks
    2007 14th IEEE International Conference on Electronics Circuits and Systems, 2007
    Co-Authors: Ki-hong Kim, Jinkeun Hong, Jongin Lim
    Abstract:

    Secure Communication reestablishment together with fast secret materials generations are key points in terms of the quality and performance of Secure aero-wireless networks. In this paper, a fast Secure Communication reestablishing mechanism for Secure aero-wireless networks is initially presented. The performance in terms of the consumed time and bit error rate (BER) while reestablishing Secure Communication using the proposed mechanism is then analyzed and compared. Our proposed mechanism is found to achieve better performance than that of conventional mechanism.

  • MUE - Approach of the Secure Communication Mechanism in Aero-wireless Environment
    2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07), 2007
    Co-Authors: Ki-hong Kim, Jinkeun Hong, Jongin Lim
    Abstract:

    Aero-wireless network is a wireless environment between aircraft stations and ground stations, or between aircraft stations. Secure Communications in aero-wireless network are inherently unreliable and discontinuous resulting infrequent encrypted data losses/insertions. If an encrypted data is lost or inserted, a new Secure connection can be setup without complex cryptographic computations. This work focuses on one important attention of aero-wireless network, namely, Secure Communication restart and how it works after encrypted data loss/insertion in Communication channel. In this paper, we first present a Secure Communication restarting mechanism for an aero-wireless network. We then compare and analyze the processing time and bit error rate (BER) while restarting a Secure Communication using proposed mechanism. To our knowledge, this is the first proposal and comprehensive analysis of the Secure Communication restarting mechanism in aero-wireless networks. Our results can be used to design technique of efficient Secure Communication for aero-wireless networks.

  • DEXA - Analysis of the power consumption of Secure Communication in wireless networks
    Lecture Notes in Computer Science, 2006
    Co-Authors: Ki-hong Kim, Jinkeun Hong, Jongin Lim
    Abstract:

    With the growth of the Internet, Communication and network security have been the focus of much attention. In addition, deployment of resource intensive security protocols in battery-powered mobile devices has raised power consumption to a significant design basis of network design. In this paper, we propose a power-efficient Secure Communication restart mechanism for a wireless network and analyze the power consumed while restarting a Secure Communication. An experimental test bed was developed to inspect the proposed mechanism and to evaluate it in terms of power consumption relative to that of conventional Secure Communication restart mechanisms. Using our enhanced mechanism, we were able to reduce the power consumed during a Secure Communication restart by up to 60% compared with conventional restart mechanisms.

  • Analysis of the power consumption of Secure Communication in wireless networks
    Lecture Notes in Computer Science, 2006
    Co-Authors: Ki-hong Kim, Jinkeun Hong, Jongin Lim
    Abstract:

    With the growth of the Internet, Communication and network security have been the focus of much attention. In addition, deployment of resource intensive security protocols in battery-powered mobile devices has raised power consumption to a significant design basis of network design. In this paper, we propose a power-efficient Secure Communication restart mechanism for a wireless network and analyze the power consumed while restarting a Secure Communication. An experimental test bed was developed to inspect the proposed mechanism and to evaluate it in terms of power consumption relative to that of conventional Secure Communication restart mechanisms. Using our enhanced mechanism, we were able to reduce the power consumed during a Secure Communication restart by up to 60% compared with conventional restart mechanisms.

Yeng Chai Soh - One of the best experts on this subject based on the ideXlab platform.

  • A new chaotic Secure Communication system
    IEEE Transactions on Communications, 2003
    Co-Authors: Zhengguo Li, Changyun Wen, Kun Li, Yeng Chai Soh
    Abstract:

    The paper proposes a digital chaotic Secure Communication by introducing a magnifying glass concept, which is used to enlarge and observe minor parameter mismatch so as to increase the sensitivity of the system. The encryption method is based on a one-time pad encryption scheme, where the random key sequence is replaced by a chaotic sequence generated via a Chua's circuit. We make use of an impulsive control strategy to synchronize two identical chaotic systems embedded in the encryptor and the decryptor, respectively. The lengths of impulsive intervals are piecewise constant and, as a result, the security of the system is further improved. Moreover, with the given parameters of the chaotic system and the impulsive control law, an estimate of the synchronization time is derived. The proposed cryptosystem is shown to be very sensitive to parameter mismatch and hence the security of the chaotic Secure Communication system is greatly enhanced.

Yvo Desmedt - One of the best experts on this subject based on the ideXlab platform.

  • ASIACRYPT - Secure Communication in multicast graphs
    Lecture Notes in Computer Science, 2011
    Co-Authors: Qiushi Yang, Yvo Desmedt
    Abstract:

    In this paper we solve the problem of Secure Communication in multicast graphs, which has been open for over a decade. At Eurocrypt '98, Franklin and Wright initiated the study of Secure Communication against a Byzantine adversary on multicast channels in a neighbor network setting. Their model requires node-disjoint and neighbor-disjoint paths between a sender and a receiver. This requirement is too strong and hence not necessary in the general multicast graph setting. The research to find the lower and upper bounds on network connectivity for Secure Communication in multicast graphs has been carried out ever since. However, up until this day, there is no tight bound found for any level of security. We study this problem from a new direction, i.e., we find the necessary and sufficient conditions (tight lower and upper bounds) for Secure Communication in the general adversary model with adversary structures, and then apply the results to the threshold model. Our solution uses an extended characterization of the multicast graphs, which is based on our observation on the eavesdropping and separating activities of the Byzantine adversary.

  • ASIACRYPT - Secure Communication in an Unknown Network Using Certificates
    Advances in Cryptology - ASIACRYPT’99, 1999
    Co-Authors: Mike Burmester, Yvo Desmedt
    Abstract:

    We consider the problem of Secure Communication in a network with malicious (Byzantine) faults for which the trust graph, with vertices the processors and edges corresponding to certified public keys, is not known except possibly to the adversary. This scenario occurs in several models, as for example in survivability models in which the certifying authorities may be corrupted, or in networks which are being constructed in a decentralized way. We present a protocol that allows Secure Communication in this case, provided the trust graph is sufficiently connected.

  • Secure Communication in an unknown network with Byzantine faults
    Electronics Letters, 1998
    Co-Authors: Mike Burmester, Yvo Desmedt
    Abstract:

    The authors consider the problem of Secure Communication in a network for which the trust-graph (with vertices of the processors and edges corresponding to authentication channels) is unknown to all but one non-faulty processor. It is shown that Secure Communication is obtained if the trust-graph is sufficiently connected.