作者: Odysseas G. Koufopavlou , Nicolas Sklavos
DOI:
关键词: Wireless network 、 Key management 、 Hash function 、 Access control 、 Distributed computing 、 Authentication 、 Computer science 、 Computer network 、 Hierarchical network model 、 Cryptography 、 Distributed System Security Architecture
摘要: The special needs for cryptography, of both wired and wireless networks, have attracted the researchers’ major interest in design new security schemes. This work deals with access control network hierarchy. More analytically, an efficient architecture implementation a key management protocol are proposed this paper. main philosophy is centered usage hash functions. Alternative functions been implemented studied, order to select between most architecture, concerning performance allocated resources. Finally dynamic system presented. could be applied efficiently networks multi-nodes multi-users authentication demands, providing high speed level strength.