KeyBunch:A Novel Approach to Key Management

被引:0
|
作者
Chandar, Vinoth [1 ]
Muthuregunathan, Raghavan [2 ]
机构
[1] Univ Texas Austin, Dept Comp Sci, Austin, TX 78712 USA
[2] Anna Univ, Madras Inst Technol, Dept Informat Technol, Madras 600025, Tamil Nadu, India
关键词
KeyBunch; Key Management; Unicast; Multicast;
D O I
10.1109/IADCC.2009.4809195
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information Security is an indispensable requirement in any network environment. Compromising on security may lead to serious technical and social ill effects. Security is achieved by encryption and decryption of data. Traditionally a symmetric key is initially shared between the two communicating nodes via a public key cryptography. The session is then secured using the shared key for encryption and decryption of messages. However security of the system can be enhanced if the single shared key is replaced by a bunch of keys together with a mechanism to determine the sequence in which the keys are used. In this way, the session is not compromised just by cracking a single key and a high level of security is assured and number of communications involved between the two communicators in order to exchange the symmetric key is decreased. Our work explains the concept of keybunch,how it works?, Protocol of key bunch exchange in unicast and multicast scenarios and resistance against attacks.
引用
收藏
页码:1252 / +
页数:3
相关论文
共 50 条
  • [31] An Efficient Key Management Approach for Multicasting Supported Networks
    Kori, Narendra Kumar
    Raghuwanshi, Sandeep
    [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 905 - 908
  • [32] A lightweight hierarchical key management approach for internet of things
    Najafi, Zamineh
    Babaie, Shahram
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [33] Quantum Key Distribution: An Optimization Approach for the Management Plane
    Savva, Giannis
    Manousakis, Konstantinos
    Gunkel, Matthias
    Ellinas, Georgios
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 5737 - 5743
  • [34] A Conventional Authentication in Key Management using Progressive Approach
    [J]. Sakkarapany, S., 2012, International Journal of Computer Science Issues (IJCSI) (09): : 1 - 2
  • [35] New Key Management Approach for Broadcast and Multicast Services
    Hwang, Sungoh
    Seleznev, Sergey
    Lee, Jae Yong
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (02) : 262 - 264
  • [36] A novel ontology matching approach using key concepts
    Kiren, Tayybah
    Shoaib, Muhammad
    [J]. ASLIB JOURNAL OF INFORMATION MANAGEMENT, 2016, 68 (01) : 99 - 111
  • [37] REGGAE: a novel approach for the identification of key transcriptional regulators
    Kehl, Tim
    Schneider, Lara
    Kattler, Kathrin
    Stoeckel, Daniel
    Wegert, Jenny
    Gerstner, Nico
    Ludwig, Nicole
    Distler, Ute
    Schick, Markus
    Keller, Ulrich
    Tenzer, Stefan
    Gessler, Manfred
    Walter, Joern
    Keller, Andreas
    Graf, Norbert
    Meese, Eckart
    Lenhof, Hans-Peter
    [J]. BIOINFORMATICS, 2018, 34 (20) : 3503 - 3510
  • [38] A novel approach to the design of an IS management course
    Copenhagen Business School, Harvard Business School, Denmark
    不详
    不详
    [J]. Commun. Assoc. Info. Syst., 2009, 1 (315-332):
  • [39] A Novel Approach To Management Of The Difficult Airway
    Farrell, E.
    Skinner, L.
    Altaf, W.
    [J]. IRISH JOURNAL OF MEDICAL SCIENCE, 2020, 189 (SUPPL 1) : S3 - S3
  • [40] A novel approach to certificate revocation management
    Mukkamala, R
    Jajodia, S
    [J]. DATABASE AND APPLICATION SECURITY XV, 2002, 87 : 225 - 238