Session Key Agreement for End-to-End Security in Time-Synchronized Networks

被引:0
|
作者
Wang, Qinghua [1 ]
Huang, Xin [2 ]
Mengistu, Dawit [1 ]
机构
[1] Kristianstad Univ, Dept Comp Sci, Fac Nat Sci, SE-29188 Kristianstad, Sweden
[2] Xian Jiaotong Liverpool Univ, Dept Comp Sci & Software Engn, Suzhou, Peoples R China
关键词
Session key; time synchronization; security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Time synchronization is important for many network applications. This paper utilizes the fact that time service is a standard service in almost all kinds of computer networks, and proposes a new session key agreement protocol by building sessions keys based on the locally available time information. A prototype system has been tested in the simulation environment and the results are promising.
引用
收藏
页码:493 / 496
页数:4
相关论文
共 50 条
  • [21] The sharing session key component (SSKC) algorithm for end-to-end secure wireless communication
    Wu, HK
    Yang, SC
    Lin, YT
    34TH ANNUAL 2000 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2000, : 242 - 250
  • [22] QKD Key Provisioning With Multi-Level Pool Slicing for End-to-End Security Services in Optical Networks
    Zhu, Qingcheng
    Yu, Xiaosong
    Zhao, Yongli
    Nag, Avishek
    Zhang, Jie
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2153 - 2169
  • [23] Composable end-to-end security of Gaussian quantum networks with untrusted relays
    Ghalaii, Masoud
    Papanastasiou, Panagiotis
    Pirandola, Stefano
    NPJ QUANTUM INFORMATION, 2022, 8 (01)
  • [24] Providing End-to-End Security Using Quantum Walks in IoT Networks
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    Elwahsh, Haitham
    Piran, Md Jalil
    Bashir, Ali Kashif
    Song, Oh-Young
    Mazurczyk, Wojciech
    IEEE ACCESS, 2020, 8 : 92687 - 92696
  • [25] Composable end-to-end security of Gaussian quantum networks with untrusted relays
    Masoud Ghalaii
    Panagiotis Papanastasiou
    Stefano Pirandola
    npj Quantum Information, 8
  • [26] EndSec: An End-to-End Message Security Protocol for Mobile Telecommunication Networks
    Kotapati, Kameswari
    Liu, Peng
    LaPorta, Thomas F.
    2008 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOLS 1 AND 2, 2008, : 776 - 782
  • [27] The model of end-to-end call setup time calculation for Session Initiation Protocol
    Gutkowski, P. S.
    Kaczmarek, S.
    BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES, 2012, 60 (01) : 95 - 101
  • [28] SYNCHRONIZED, END-TO-END TESTS ON PROTECTIVE RELAY SCHEMES
    RYAN, B
    LITTMAN, J
    IEEE COMPUTER APPLICATIONS IN POWER, 1995, 8 (04): : 20 - 25
  • [29] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [30] Synthesising End-to-End Security Protocols
    Thevathayan, Charles
    Bertok, Peter
    Fernandez, George
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447