Session Key Agreement for End-to-End Security in Time-Synchronized Networks

被引:0
|
作者
Wang, Qinghua [1 ]
Huang, Xin [2 ]
Mengistu, Dawit [1 ]
机构
[1] Kristianstad Univ, Dept Comp Sci, Fac Nat Sci, SE-29188 Kristianstad, Sweden
[2] Xian Jiaotong Liverpool Univ, Dept Comp Sci & Software Engn, Suzhou, Peoples R China
关键词
Session key; time synchronization; security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Time synchronization is important for many network applications. This paper utilizes the fact that time service is a standard service in almost all kinds of computer networks, and proposes a new session key agreement protocol by building sessions keys based on the locally available time information. A prototype system has been tested in the simulation environment and the results are promising.
引用
收藏
页码:493 / 496
页数:4
相关论文
共 50 条
  • [41] A Key Independence Group Key Management Scheme for Non-Reliable End-to-End Networks
    Zhou, Jian
    Sun, Liyan
    Huang, Shihua
    International Journal of Network Security, 2024, 26 (02) : 285 - 298
  • [42] Packet Key-Based End-to-End Security Management on a Blockchain Control Plane
    Jung, Younchan
    Peradilla, Marnel
    Agulto, Ronnel
    SENSORS, 2019, 19 (10):
  • [43] Two-factor Password-authenticated Key Exchange with End-to-end Security
    Jarecki, Stanislaw
    Jubur, Mohammed
    Krawczyk, Hugo
    Saxena, Nitesh
    Shirvanian, Maliheh
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (03)
  • [44] KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY.
    Kasami, Tadao
    Yamamura, Saburo
    Mori, Kenichi
    Systems, computers, controls, 1982, 13 (03): : 59 - 69
  • [45] End-to-End Quantum Key Distribution (QKD) from Metro to Access Networks
    Wang, Hua
    Zhao, Yongli
    Nag, Avishek
    Yu, Xiaosong
    He, Xinyi
    Zhang, Jie
    2020 16TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS DRCN 2020, 2020,
  • [46] SIP signaling security for end-to-end communication
    Ono, K
    Tachimoto, S
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1042 - 1046
  • [47] The study on end-to-end security for ubiquitous commerce
    Hangbae Chang
    The Journal of Supercomputing, 2011, 55 : 228 - 245
  • [48] The study on end-to-end security for ubiquitous commerce
    Chang, Hangbae
    JOURNAL OF SUPERCOMPUTING, 2011, 55 (02): : 228 - 245
  • [49] An end-to-end hardware approach security for the GPRS
    Kitsos, P
    Sklavos, N
    Koufopavlou, O
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 791 - 794
  • [50] An End-to-End View of IoT Security and Privacy
    Ling, Zhen
    Liu, Kaizheng
    Xu, Yiling
    Jin, Yier
    Fu, Xinwen
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,