Access Control in Networks Hierarchy: Implementation of Key Management Protocol

作者: Odysseas G. Koufopavlou , Nicolas Sklavos

DOI:

关键词: Wireless networkKey managementHash functionAccess controlDistributed computingAuthenticationComputer scienceComputer networkHierarchical network modelCryptographyDistributed System Security Architecture

摘要: The special needs for cryptography, of both wired and wireless networks, have attracted the researchers’ major interest in design new security schemes. This work deals with access control network hierarchy. More analytically, an efficient architecture implementation a key management protocol are proposed this paper. main philosophy is centered usage hash functions. Alternative functions been implemented studied, order to select between most architecture, concerning performance allocated resources. Finally dynamic system presented. could be applied efficiently networks multi-nodes multi-users authentication demands, providing high speed level strength.

参考文章(12)
Selim G. Akl, Peter D. Taylor, Cryptographic Solution to a Multilevel Security Problem international cryptology conference. pp. 237- 249 ,(1983) , 10.1007/978-1-4757-0602-4_23
N. Sklavos, P. Kitsos, K. Papadomanolakis, O. Koufopavlou, Random number generator architecture and VLSI implementation international symposium on circuits and systems. ,vol. 4, pp. 854- 857 ,(2002) , 10.1109/ISCAS.2002.1010592
Selim G. Akl, Peter D. Taylor, Cryptographic solution to a problem of access control in a hierarchy ACM Transactions on Computer Systems. ,vol. 1, pp. 239- 248 ,(1983) , 10.1145/357369.357372
Cungang Yang, Celia Li, Access control in a hierarchy using one-way hash functions Computers & Security. ,vol. 23, pp. 659- 664 ,(2004) , 10.1016/J.COSE.2004.08.004
Hans Dobbertin, Antoon Bosselaers, Bart Preneel, RIPEMD-160: A Strengthened Version of RIPEMD fast software encryption. pp. 71- 82 ,(1996) , 10.1007/3-540-60865-6_44
Douglas R. Stinson, Cryptography: Theory and Practice ,(1995)
J.-H. Huang, S. Mishra, Mykil: a highly scalable key distribution protocol for large group multicast global communications conference. ,vol. 3, pp. 1476- 1480 ,(2003) , 10.1109/GLOCOM.2003.1258483
Chung Kei Wong, Mohamed Gouda, Simon S. Lam, Secure group communications using key graphs acm special interest group on data communication. ,vol. 28, pp. 68- 79 ,(1998) , 10.1145/285237.285260
Gerald Edward Sobelman, David Parker, Programmable gate array ,(1998)