When the group members detect an unexpected separation from the Master, they restart the initialization of the group key with a new master`s selection. In the worst case scenario, members can often find themselves in the event of a failure to connect with the master. In this case, the first protocol should be slightly modified so that all members of the group have the list of lockers and each member of the group leader is in charge of box 3. For example, a general member in the first stage of Boxing 1 transmits his locker to the group as follows: Group members continue to communicate safely with a new group key obtained through group encryption. We provide official security evidence to Section 5. Second, the protocol uses pseudo-identity instead of a true identity to create a secure D2D group session for privacy. Only users can assign the pseudo-identity to the corresponding real identity (RID). Users share a low-entropy crypto-system system with a public key, used to transfer information to the public channel and ensure the security of settings in the process of generating session keys. The proof. A locker received by the master of the group members is what a member of the group signs with his public key certified by a CERTIFICATION organization. Concretely, a locker is chopped by a single function like SHA-2, and Hash () is signed with the private key with a digital signature algorithm like RSA, DSA and ECDSA. The locker is then checked with the public key and certified by CA.

If a non-member locker is included in a group`s locker list, it must be accompanied by a forged signature. This means that the problem arises in the event of a ha hashkollision attack or an unauthorized certification certificate [23]. Once all the checked lockers have been transferred to the Master, all other nodes that are not members of the group can restore the group key under the DH hypothesis (Theorme 4 and 5). The group key is equal to the group master`s locker, if it is the secret of the Masters. Therefore, operations for computer and group messages never contain. Abandoned nodes cannot learn the new group key because the broadcast message does not contain lockers to leave members. Note that the set for the abandoned knot does not contain the Master. The exit of the Masters requires a “delegation” in which the Master transmits the list of the group`s lockers to the new group master as follows: The delegation can be used in another case where the Master wishes to terminate the master`s role for a reason such as the change of network topology or the depletion of resources. That is, the Master speaks to a member of the group who does not leave the group.

In Senza categoria. Bookmark the permalink.