Secure encryption key management as a SecaaS based on Chinese wall security policy

2021 ◽  
Vol 63 ◽  
pp. 102975
Author(s):  
Saad Fehis ◽  
Omar Nouali ◽  
Tahar Kechadi
Author(s):  
Ioannis P. Chochliouros ◽  
Anastasia S. Spiliopoulou ◽  
Stergios P. Chochliouros ◽  
Konstantinos N. Voudouris

This chapter presents systems of certification authorities and registration authorities and other supporting servers and agents that perform certificate management, archive management, key management, and token management functions. These activities that support security policy by monitoring and controlling security services, elements and mechanisms, distributing security information, and reporting security events are examined with the main focus on PKI authentication technology.


Author(s):  
Chi-Yuan Chen ◽  
Han-Chieh Chao

Cross-Layer Design is useful for wireless communication to improve the performance and efficiency. On the other hand, Cross-Layer Design is also helpful in enhancing network security. With the help of cross-layer information and interactions, the security overhead can be reduced and the security efficiency can be improved. In this chapter, the authors review the existing literature and provide a taxonomy based on their methods and applications. According to their survey, these cross-layer security enhancements could be classified into four categories: 1) security protocol; 2) security policy; 3) key management; 4) intrusion detection. The authors hope to attract more applications and research attention in this direction.


2020 ◽  
Vol 17 (1) ◽  
pp. 409-417
Author(s):  
Soram Ranbir Singh ◽  
Khan Kumar Ajoy

Wireless sensor network (WSN) is a growing expertise which has been used in many areas such as airports, smart watches, smart cities, smart health organizations, and smart homes. It has provided mankind with a lot of benefits in different areas and domains. They are also used in disaster management, habitat monitoring in forests, and many applications in hostile areas such as military; therefore, there is a need to enforce security policy. Also, in many instances of data transfer in WSNs, there is a need of stricter authentication process. Presently, authentication in WSNs is commonly achieved through the use of usernames and passwords. A wicked attacker can impersonate to the network as a genuine user by using stolen password(s). This is chiefly due to the lack of proper key management scheme(s) currently available for WSNs. Moreover, because of limited memory and computing power, it is problematic to decide the proper key management system for WSNs. We propose a key management scheme (KMS) for WSNs using an elliptic curve in this paper. The proposed KMS is implemented in Java SE 6(Mustang) and evaluated for critical performance by using an elliptic curve in a WSN of varied cluster head (CH) sizes.


Author(s):  
L. Moulad ◽  
R. Chaabita ◽  
K. Balar

Abstract. The ad hoc network (or MANET, for Mobile Ad hoc NETwork) is a system containing a set of devices that organize themselves, thus forming an autonomous and dynamic network, communicating via radio interface. These devices can be fixed or mobile, no wired infrastructure is available, and so these objects have to dynamically discover their environment.The design of these applications is based on trust between the nodes constituting the network. Unfortunately, when deploying randomly in difficult hostile areas, seeing impossible to monitor, not to mention the uncertainty of the communication channel, the sensor nodes are exposed to all types of attacks and intrusions, which can hinder and prevent the diffusion of the information between the sensor nodes of the network, and influencing its performance.Many approaches have been proposed to solve security problems in wireless networks. The solutions can be mainly classified into two categories: symmetric and asymmetric key management schemes. Indeed it is clear, that the optimal solution in this case is to use symmetric shared key systems.In this paper, the idea of LEAP improved is to apply the same Mechanisms used in LEAP Enhanced to overcome a compromised node and also prevent a compromised base station node while using a multiple base station network, this will, on the one hand, minimize power consumption, and secondly, to replace a base station in the event of a compromise, to ensure the continuity and proper functioning of the network. The evaluation of the proposed solution was carried out using the TOSSIM simulation tool.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


Sign in / Sign up

Export Citation Format

Share Document