2016
DOI: 10.1504/ijcse.2016.074558
|View full text |Cite
|
Sign up to set email alerts
|

Flexible group key management and secure data transmission in mobile device communications using elliptic curve Diffie-Hellman cryptographic system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…The key length must be 1024 bits to provide a higher level of security. Although ECDH uses the Diffie-Hellman key protocol to implement elliptic curve cryptosystems, ECDH only requires 160 bits of key length and consumes less computing resources to achieve the same security strength [24][25] [26]. Therefore, ECDH is very suitable for the network of vehicles that lack computing resources.…”
Section: The Methods Of the Secure Data Transmissionmentioning
confidence: 99%
“…The key length must be 1024 bits to provide a higher level of security. Although ECDH uses the Diffie-Hellman key protocol to implement elliptic curve cryptosystems, ECDH only requires 160 bits of key length and consumes less computing resources to achieve the same security strength [24][25] [26]. Therefore, ECDH is very suitable for the network of vehicles that lack computing resources.…”
Section: The Methods Of the Secure Data Transmissionmentioning
confidence: 99%
“…They investigate how to manage the intra-group key. However, the research results indicate that a dynamic topology is a complex issue to implement the intra-group key (Lin et al, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…Many works related to routing security (Korba et al , 2016; Kraft et al , 2009; Marti et al , 2000; Şahin and Ümit Uyar, 2012; Zapata and Asokan, 2002) focus on the efficient use of digital signatures or shared secret keys to authenticate and secure the data and packet headers. However, key management (Jog and Murugan, 2017; Khatri, 2014; Lin et al , 2016), which is the basis for the proper functioning of secure routing, is typically used to resist against the external attacks, but it shows inefficiency in handling the attacks from the internal malicious nodes, which may lead to a serious influence on the security, the confidentiality and the life cycle of the whole network (Xia, Jia, Ju and Zhu, 2011).…”
Section: Introductionmentioning
confidence: 99%