Pub Date : 1900-01-01DOI: 10.26634/jmat.11.1.18502
A. Murthy, Reddy P. Vasudeva
Group theory and Combinatorics play important role in design security protocols, algorithms and techniques for various security applications. Secure group-oriented communication is crucial to a wide range of applications in Internet of Things (IoT). Key management is the mechanism which is used to work out the problem of creation, establishment, to distribute, periodic refresh and the maintenance of the cryptographic keys. It is not enough to care only about primitives that satisfy a stated security objective in the domain of the IoT. The design of group key establishment techniques for securing group communications between resource-constrained IoT devices is presented in this work. Furthermore, the paper assesses possible ways for tailoring current security protocols to the peculiarities of IoT devices and networks.
{"title":"Application of mathematics in design of group key management method","authors":"A. Murthy, Reddy P. Vasudeva","doi":"10.26634/jmat.11.1.18502","DOIUrl":"https://doi.org/10.26634/jmat.11.1.18502","url":null,"abstract":"Group theory and Combinatorics play important role in design security protocols, algorithms and techniques for various security applications. Secure group-oriented communication is crucial to a wide range of applications in Internet of Things (IoT). Key management is the mechanism which is used to work out the problem of creation, establishment, to distribute, periodic refresh and the maintenance of the cryptographic keys. It is not enough to care only about primitives that satisfy a stated security objective in the domain of the IoT. The design of group key establishment techniques for securing group communications between resource-constrained IoT devices is presented in this work. Furthermore, the paper assesses possible ways for tailoring current security protocols to the peculiarities of IoT devices and networks.","PeriodicalId":297202,"journal":{"name":"i-manager’s Journal on Mathematics","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126218716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DYNAMICS OF A PREY AND TWO PREDATORS WITH TIME\u0000 DELAY IN PREY SPECIES","authors":"G. Satyavathi, A. Paparao, B. K. Sobhan","doi":"10.26634/jmat.8.3.17123","DOIUrl":"https://doi.org/10.26634/jmat.8.3.17123","url":null,"abstract":"","PeriodicalId":297202,"journal":{"name":"i-manager’s Journal on Mathematics","volume":"374 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132207850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}