An insight into digital twin behavior of vehicular ad hoc network for real-time cloud security and monitoring

K Lakshmi Narayanan, R Naresh - Journal of Intelligent & Fuzzy … - content.iospress.com
Abstract Vehicular Ad-Hoc Network (VANET) Technology is advancing due to the
convergence of VANET and cloud computing technologies, Vehicular Ad-Hoc Network …

An efficient resource sharing scheme based on the linear feedback shift register

T Zhou, J Shen, H Wang - International Journal of Sensor …, 2021 - inderscienceonline.com
With the invention of various kinds of electrical equipment, electricity has become an
indispensable necessity in human society. The concept of smart grid is proposed in this …

Managing key multicasting through orthogonal systems

JA Alvarez-Bermejo, JA Lopez-Ramos… - Journal of Discrete …, 2017 - Taylor & Francis
In this paper we propose a new protocol for Group Key Management. The protocol is based
on the use of orthogonal systems in vector spaces. The main advantage in comparison to …

Security analysis of key management schemes based on Chinese remainder theorem under strong active outsider adversary model

BR Purushothama, AP Verma, A Kumar - Security in Computing and …, 2017 - Springer
The existing key management schemes have adopted the passive adversarial model to
analyze the forward secrecy and backward secrecy security requirements. However, the …

[PDF][PDF] Centralized group key management scheme for secure multicast communication using elgamal

M Shishira, K Vipin - Int. J. Eng. Res. Comput. Sci. Eng …, 2015 - scholar.archive.org
Key management is the management of cryptographic keys in a cryptosystem. This includes
dealing with the key generation, exchange, storage, use, and replacement of keys. Several …

[PDF][PDF] A centralized key table based communication efficient group key management protocol

MY Joshi, RS Bichkar - Int. J. Comput. Netw. Inf. Secur.(8), 2015 - academia.edu
Group key management is an integral part of secure multicast. Minimizing the number of
rekeying messages, maintaining the forward and backward secrecy has always been a …

Centralized group key management algorithm based on polynomial construction

Q Chen, F Miao - International Conference on Advanced …, 2022 - spiedigitallibrary.org
With the improvement of network technology, group key management system gradually
becomes an important research topic. In general, the group key management protocol …

[PDF][PDF] Multicast Communication using Different Group Key Managements

HS Ranjan Kumar, G Aithal, S Shetty - researchgate.net
The most appropriate communication mechanism for transfer of packets from one source to
another is multicast IPv6 communication. Nowadays, multicast communication plays a major …

Improved Mutual Authentication in VANETs.

M Rekik, A Makhlouf, F Zarai… - Adhoc & Sensor …, 2018 - search.ebscohost.com
Vehicular ad hoc networks (VANETs) are a key of the intelligent transport system. In fact,
these networks provide many interesting services such as exchanging live messages like …

Symmetric Key and Polynomial Based Key Generation Mechanism for Secured Data Communications in 5G Networks

P Suthanthiramani, M Sannasy, S Ganapathy… - 2021 - researchsquare.com
Fifth Generation (5G) networks provide data communications through various latest
technologies including Software Defined Network (SDN), Artificial Intelligence, Machine …