Session Key Agreement for End-to-End Security in Time-Synchronized Networks

被引:0
|
作者
Wang, Qinghua [1 ]
Huang, Xin [2 ]
Mengistu, Dawit [1 ]
机构
[1] Kristianstad Univ, Dept Comp Sci, Fac Nat Sci, SE-29188 Kristianstad, Sweden
[2] Xian Jiaotong Liverpool Univ, Dept Comp Sci & Software Engn, Suzhou, Peoples R China
关键词
Session key; time synchronization; security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Time synchronization is important for many network applications. This paper utilizes the fact that time service is a standard service in almost all kinds of computer networks, and proposes a new session key agreement protocol by building sessions keys based on the locally available time information. A prototype system has been tested in the simulation environment and the results are promising.
引用
收藏
页码:493 / 496
页数:4
相关论文
共 50 条
  • [31] A transparent end-to-end security solution
    Thomas, S
    Misra, D
    Eswari, PRL
    Babu, NSC
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
  • [32] An end-to-end security solution for SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +
  • [33] End-to-End Security for Personal Telehealth
    Koster, Paul
    Asim, Muhammad
    Petkovic, Milan
    USER CENTRED NETWORKED HEALTH CARE, 2011, 169 : 621 - 625
  • [34] End-to-End Security for Enterprise Mashups
    Rosenberg, Florian
    Khalaf, Rania
    Duftler, Matthew
    Curbera, Francisco
    Austel, Paula
    SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 389 - +
  • [35] End-to-end security for GSM users
    Rekha, AB
    Umadevi, B
    Solanke, Y
    Kolli, SR
    2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 434 - 437
  • [36] End-To-End Memory Networks
    Sukhbaatar, Sainbayar
    Szlam, Arthur
    Weston, Jason
    Fergus, Rob
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 28 (NIPS 2015), 2015, 28
  • [37] End-to-end delay analysis for real-time networks
    Yeung, SN
    Lehoczky, J
    22ND IEEE REAL-TIME SYSTEMS SYMPOSIUM, PROCEEDINGS, 2001, : 299 - 309
  • [38] Software-defined security controller-based end-to-end packet key security management
    Jung, Younchan
    Peradilla, Marnel
    Agulto, Ronnel
    16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 89 - 96
  • [39] A certificateless one-way group key agreement protocol for end-to-end email encryption
    Yeh, Jyh-haw
    Sridhar, Srisarguru
    Dagher, Gaby G.
    Sun, Hung-Min
    Shen, Ning
    White, Kathleen Dakota
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 34 - 43
  • [40] End-to-End Session-Based Recommendation on GPU
    Pereira Moreira, Gabriel de Souza
    Rabhi, Sara
    Ak, Ronay
    Schifferer, Benedikt
    15TH ACM CONFERENCE ON RECOMMENDER SYSTEMS (RECSYS 2021), 2021, : 831 - 833