Session Key Agreement for End-to-End Security in Time-Synchronized Networks

被引:0
|
作者
Wang, Qinghua [1 ]
Huang, Xin [2 ]
Mengistu, Dawit [1 ]
机构
[1] Kristianstad Univ, Dept Comp Sci, Fac Nat Sci, SE-29188 Kristianstad, Sweden
[2] Xian Jiaotong Liverpool Univ, Dept Comp Sci & Software Engn, Suzhou, Peoples R China
关键词
Session key; time synchronization; security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Time synchronization is important for many network applications. This paper utilizes the fact that time service is a standard service in almost all kinds of computer networks, and proposes a new session key agreement protocol by building sessions keys based on the locally available time information. A prototype system has been tested in the simulation environment and the results are promising.
引用
收藏
页码:493 / 496
页数:4
相关论文
共 50 条
  • [1] Session key agreement protocol for end-to-end security in MANET
    Lim, Jeong-Mi
    Park, Chang-Seop
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 679 - 686
  • [2] A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams
    Puthal, Deepak
    Nepal, Surya
    Ranjan, Rajiv
    Chen, Jinjun
    PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 6011 - 6020
  • [3] Synchronized end-to-end multicast in real-time packet cellular networks
    Xu, DY
    Li, BC
    IEEE MILITARY COMMUNICATIONS CONFERENCE - PROCEEDINGS, VOLS 1-3, 1998, : 431 - 435
  • [4] Fair End-to-End Session Rates in Multihop Wireless Networks
    Hwang, Won-Joo
    Le, Cong-Loi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10) : 2827 - 2832
  • [5] The end of end-to-end security?
    Bradner, S
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [6] End-to-end security in telemedical networks - A practical guideline
    Wozak, Florian
    Schabetsberger, Thomas
    Ammmenwerth, Elske
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2007, 76 (5-6) : 484 - 490
  • [7] End-to-end Security for Sleepy Smart Object Networks
    Sethi, Mohit
    Arkko, Jari
    Keranen, Ari
    PROCEEDINGS OF THE 37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN 2012), 2012, : 973 - 981
  • [8] Embedded end-to-end wireless security with ECDH key exchange
    Kumar, S
    Girimondo, M
    Weimerskirch, A
    Paar, C
    Patel, A
    Wander, AS
    Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 786 - 789
  • [9] Application Layer Key Establishment for End-to-End Security in IoT
    Perez, Salvador
    Hernandez-Ramos, Jose L.
    Raza, Shahid
    Skarmeta, Antonio
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 2117 - 2128
  • [10] Auxiliary Graph based QKD Key Provisioning for End-to-End Security Service in Optical Networks
    Zhu, Qingcheng
    Yu, Xiaosong
    Zhao, Yongli
    Nag, Avishek
    Wang, Hua
    Chen, Liquan
    Zhang, Jie
    2022 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXHIBITION (OFC), 2022,