KeyBunch:A Novel Approach to Key Management

被引:0
|
作者
Chandar, Vinoth [1 ]
Muthuregunathan, Raghavan [2 ]
机构
[1] Univ Texas Austin, Dept Comp Sci, Austin, TX 78712 USA
[2] Anna Univ, Madras Inst Technol, Dept Informat Technol, Madras 600025, Tamil Nadu, India
关键词
KeyBunch; Key Management; Unicast; Multicast;
D O I
10.1109/IADCC.2009.4809195
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information Security is an indispensable requirement in any network environment. Compromising on security may lead to serious technical and social ill effects. Security is achieved by encryption and decryption of data. Traditionally a symmetric key is initially shared between the two communicating nodes via a public key cryptography. The session is then secured using the shared key for encryption and decryption of messages. However security of the system can be enhanced if the single shared key is replaced by a bunch of keys together with a mechanism to determine the sequence in which the keys are used. In this way, the session is not compromised just by cracking a single key and a high level of security is assured and number of communications involved between the two communicators in order to exchange the symmetric key is decreased. Our work explains the concept of keybunch,how it works?, Protocol of key bunch exchange in unicast and multicast scenarios and resistance against attacks.
引用
收藏
页码:1252 / +
页数:3
相关论文
共 50 条
  • [1] A novel approach to key management using visual cryptography
    Bhat, Mundukur Nirupama
    Buradagunta, Suvarna
    Rani, Kuruba Usha
    [J]. Ingenierie des Systemes d'Information, 2019, 24 (06): : 627 - 632
  • [2] A Distributed Key Management Approach
    Dowsley, Rafael
    Gabel, Matthias
    Huebsch, Gerald
    Schiefer, Gunther
    Schwichtenberg, Antonia
    [J]. 2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 509 - 514
  • [3] A key management approach of multicast
    Jiang, Z
    Wang, XL
    Zhang, HK
    Zhang, LY
    [J]. APOC 2002: ASIA-PACIFIC OPTICAL AND WIRELESS COMMUNICATIONS; NETWORK DESIGN AND MANAGEMENT, 2002, 4909 : 276 - 280
  • [4] A Novel Key Management for Virtually Limitless Key Size
    Omerasevic, Damir
    Behlilovic, Narcis
    Mrdovic, Sasa
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, 2015, 9522 : 102 - 118
  • [5] A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach
    Kimbahune, Vinod Vijaykumar
    Deshpande, Arvind V.
    Mahalle, Parikshit N.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2018, 9 (01) : 92 - 121
  • [6] A Novel Key Management Scheme in VANETs
    Duan, Guihua
    Xiao, Yun
    Ju, Rui
    Song, Hong
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT I, 2014, 8630 : 587 - 595
  • [7] Security in a Distributed Key Management Approach
    Schiefer, Gunther
    Citak, Murat
    Schoknecht, Andreas
    Gabel, Matthias
    Mechler, Jeremias
    [J]. 2017 IEEE 30TH INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS (CBMS), 2017, : 816 - 821
  • [8] Proposing a novel Dynamic AES for image encryption using a chaotic map key management approach
    Shariatzadeh, Mahdi
    Rostami, Mohammad Javad
    Eftekhari, Mahdi
    [J]. OPTIK, 2021, 246
  • [9] A novel communication-aware adaptive key management approach for ensuring security in IoT networks
    Tamizhselvan, C.
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (11)
  • [10] A Novel Key Management Scheme Using Biometrics
    Sui, Yan
    Yang, Kai
    Du, Yingzi
    Orr, Scott
    Zou, Xukai
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2010, 2010, 7708