Friday, August 2, 2019

SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS

SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
Adarsh Kumar1, Alok Aggarwal2 and Charu3
123Department of Computer Science and Information Technology, Jaypee Institute of Information and Technology, Noida, INDIA

ABSTRACT
The purpose of this paper is to survey the key management protocols for wired and wireless networks and study their security aspects in terms of key generation, agreement and distribution. The central research challenge is exhaustive survey of secure and efficient key management protocols. In this survey, it is shown that all these protocols could be placed under one of two key management protocol categories: (i) peer to peer communication and (ii) group communication. This can also be analyzed that peer to peer key management can be classified as: (i) symmetric key, (ii) asymmetric key and (iii) hybrid key management protocols and group communication can further be classified as: (i) Diffie-Hellman based (ii)Hybrid key management. We can say that our theoretical and execution analysis of protocols emphasise various observations that can motivate researchers in key management issues of networks.

KEYWORDS
Key Management Protocols, Peer to Peer, Group, Multicast, Hierarchical, Tree based, Trusted Third Party, Escrow less, Server based, Server less 





No comments:

Post a Comment

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#networksecurity #artificialintelligence #machinelearning #security #blockchain #technology #cybersecurity #cloud #fog #edge #crytography #p...