A lightweight group key management scheme with constant rekeying cost and public bulletin size

P Sharma, P BR - Information Security Journal: A Global …, 2024 - Taylor & Francis
Several group key management schemes have focused either on meeting security goals or
efficiency. However, only a few works exist that address the issue of handling offline users …

TAGKA: threshold authenticated group key agreement protocol against member disconnect for UANET

Z Zhang, X Li, Y Wang, Y Miao, X Liu… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The development of unmanned aerial vehicle (UAV) technology has been advancing rapidly
and is widely applied in various domains. Compared to a single UAV, the multi-UAV system …

Efficient and secure key management for conditional access systems

O Pal, B Alam - IEEE Transactions on Consumer Electronics, 2019 - ieeexplore.ieee.org
In Digital TV service, subscribers get the access of channels of their interest. In conditional
access systems (CAS), Control Word is used to deliver the multimedia content to legitimate …

PSEEMV: Provably secure and efficient emergency message verification scheme based on ECC and CRT for Space Information Network

J Guo, Y Du, D Zhang, R Wu - Journal of Information Security and …, 2023 - Elsevier
With the rapid development of satellite computing and communication capabilities, Space
Information Network (SIN) makes it possible for users to obtain subscription services …

Software-defined security controller-based group management and end-to-end security management

E Festijo, Y Jung, M Peradilla - Journal of Ambient Intelligence and …, 2019 - Springer
This paper proposes group management and end-to-end security management based on
the horizontal model suitable for group based private systems. The software-defined security …

Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks

S Pradeep, S Muthurajkumar, S Ganapathy, A Kannan - Soft Computing, 2024 - Springer
Fifth Generation (5G) networks provide data communications through various latest
technologies including Software Defined Networks (SDN), Artificial Intelligence, Machine …

An insight into digital twin behavior of vehicular ad hoc network for real-time cloud security and monitoring

K Lakshmi Narayanan… - Journal of Intelligent & …, 2023 - content.iospress.com
Abstract Vehicular Ad-Hoc Network (VANET) Technology is advancing due to the
convergence of VANET and cloud computing technologies, Vehicular Ad-Hoc Network …

The design of a secure key management system in vehicular ad hoc networks

KK Chauhan, S Kumar, S Kumar - 2017 conference on …, 2017 - ieeexplore.ieee.org
VANET is a kind of ad hoc networks which is built among moving vehicles on the road. Due
to mobile nodes in VANET topology of network changes dynamically. This impedes trust …

A secure Device-to-Device communication scheme for massive Machine Type Communication

P Roychoudhury, B Roychoudhury, DK Saikia - Computers & Security, 2021 - Elsevier
Abstract Massive Machine Type Communication (mMTC) services aims to provide universal
connectivity to thousands of low-power, low-cost devices with the support of 5G cellular …

A computationally efficient and scalable key management scheme for access control of media delivery in digital pay-TV systems

V Kumar, R Kumar, SK Pandey - Multimedia Tools and Applications, 2021 - Springer
In today's Internet era, group communications in multimedia applications are becoming more
and more popular. The issues of controlling illegal access to multimedia contents require …