An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption

Author(s):  
Deok-Gyu Lee ◽  
Jang-Su Park ◽  
Im-Yeong Lee ◽  
Yong-Seok Park ◽  
Jung-Chul Ahn
Author(s):  
Christos Tselikis ◽  
Christos Douligeris ◽  
S. Mitropoulos ◽  
Nikos Komninos ◽  
George Tselikis

Author(s):  
Masa-aki Fukase

Ubiquitous network is really one of remarkable trends of next generation information and communication technologies. However, the rapid increase of ubiquitous technologies has given rise to serious concerns about security issues which are getting worse, especially in the case of ad-hoc network because it is resource constrained. Both transience and secureness are characteristic features of ad-hoc network. In order to provide a sophisticated processor accompanied with such characteristics, we have so far developed HCgorilla. This is a ubiquitous processor that unifies basic aspects of PC processors, mobile processors, Java CPUs, cryptography processors, etc. The unification of these processors has shown effectiveness to achieve not only power and chip area saving but also secureness for ubiquitous environment. The secureness provided by HCgorilla is temporal with practically enough cipher strength and without relying on permanent network infrastructure. This is really one of qualitative conditions required for ad-hoc networks. Considering the ever growing ubiquitous network, the target of this study is the total optimum design of HCgorilla chips with particular emphasis on small resource and secure implementation. The improved version, HCgorilla.7 is implemented in a CMOS standard cell chip. Specific features of HCgorilla.7 are described regarding occupied area, power consumption, throughput, and cipher strength. Judging from these results, HCgorilla is one of most profitable candidates for the next generation ubiquitous environment.


2019 ◽  
Vol 68 (11) ◽  
pp. 11309-11322 ◽  
Author(s):  
Xinghua Li ◽  
Yunwei Wang ◽  
Pandi Vijayakumar ◽  
Debiao He ◽  
Neeraj Kumar ◽  
...  

2011 ◽  
Vol 5 (1) ◽  
pp. 59-67 ◽  
Author(s):  
Jianwei Liu ◽  
Ruiying Du ◽  
Jing Chen ◽  
Kun He

Sign in / Sign up

Export Citation Format

Share Document