A Novel Probabilistic Key Management Algorithm for Large-Scale MANETs

Author(s):  
M. Gharib ◽  
Ehsan Emamjomeh-Zadeh ◽  
A. Norouzi-Fard ◽  
A. Movaghar
2014 ◽  
Vol 998-999 ◽  
pp. 1092-1095
Author(s):  
Qi Sheng Zhao ◽  
Xiao Ming Liu ◽  
Hui Sheng Zhu

The information security of wireless sensor networks is one of hot issues on the current research; this paper combines threshold key scheme with the management of security key sharing and group agreement and proposes dynamic key management scheme through clustering level key matrix of authentication mechanism from the cluster to node. The network is divided into different clusters, and the cluster head conducts the key authentication exchange and updates the key management with threshold key schemes, with no need of third authentication center, reduces the computing and communication costs, and promotes communication.


Author(s):  
Valentin Cristea ◽  
Ciprian Dobre ◽  
Corina Stratan ◽  
Florin Pop

Security in distributed systems is a combination of confidentiality, integrity and availability of their components. It mainly targets the communication channels between users and/or processes located in different computers, the access control of users / processes to resources and services, and the management of keys, users and user groups. Distributed systems are more vulnerable to security threats due to several characteristics such as their large scale, the distributed nature of the control, and the remote nature of the access. In addition, an increasing number of distributed applications (such as Internet banking) manipulate sensitive information and have special security requirements. After discussing important security concepts in the Background section, this chapter addresses several important problems that are at the aim of current research in the security of large scale distributed systems: security models (which represent the theoretical foundation for solving security problems), access control (more specific the access control in distributed multi-organizational platforms), secure communication (with emphasis on the secure group communication, which is a hot topic in security research today), security management (especially key management for collaborative environments), secure distributed architectures (which are the blueprints for designing and building security systems), and security environments / frameworks.


2011 ◽  
pp. 82-95 ◽  
Author(s):  
Tawfik Jelassi ◽  
Albrecht Enders

This chapter is based on research conducted in cooperation with 12Snap, the leading European mobile marketing company, which has implemented large-scale mobile advertising campaigns with companies such as McDonald’s, Nestlé, Microsoft, Coca-Cola, Adidas, and Sony. To set the overall stage, we first discuss the advantages and disadvantages of the mobile phone in comparison to other marketing media. Then we propose a framework of different types of advertising campaigns that can be supported through the usage of mobile devices. These campaign types include (1) mobile push campaigns, (2) mobile pull campaigns, and (3) mobile dialogue campaigns. Building on this framework, we analyze different campaigns that 12Snap implemented for different consumer goods and media companies. Drawing from these experiences we then discuss a number of key management issues that need to be considered when implementing mobile marketing campaigns. They include the following themes: (1) the choice of campaign type, (2) the design of a campaign, (3) the targeting of the youth market, and (4) the combination of different media types to create integrated campaigns.


2015 ◽  
Vol 28 (4) ◽  
pp. 1174-1192 ◽  
Author(s):  
Shuangyu He ◽  
Qianhong Wu ◽  
Bo Qin ◽  
Jianwei Liu ◽  
Yan Li

Sign in / Sign up

Export Citation Format

Share Document