The Subset Keys and Identity Tickets (SKIT) Key Distribution Scheme

被引:3
|
作者
Ramkumar, Mahalingam [1 ]
机构
[1] Mississippi State Univ, Dept Comp Sci & Engn, Mississippi State, MS 39762 USA
关键词
Key distribution; message injection attacks; probabilistic key distribution;
D O I
10.1109/TIFS.2009.2039603
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Probabilistic key predistribution schemes (P-KPSs) which place modest demands on hardware are good candidates for securing interactions between resource limited computers. Collusion susceptible P-KPSs are trade-offs between security and complexity. Some facets of complexity include computation, bandwidth, and storage overhead. Metrics for security include resistance to passive eavesdropping attacks, and active message injection attacks. The contributions of this paper are three-fold: 1) a novel P-KPS, the subset keys and identity tickets (SKIT) scheme; 2) a generic KPS model to facilitate comparison of various facets of the complexity of key predistribution schemes; and 3) a new security model to describe the resistance of P-KPSs to active message-injection attacks. The two models are used to show why SKIT has many compelling advantages over existing P-KPSs in the literature. In particular, while placing lower demands on computation, bandwidth and storage overhead, SKIT realizes substantial improvements in resistance to passive and active attacks.
引用
收藏
页码:39 / 51
页数:13
相关论文
共 50 条
  • [1] Identity Based Group Key Distribution Scheme
    Wang H.
    Qin W.
    Liu Q.
    Yu C.
    Shen Z.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (10): : 2203 - 2217
  • [2] Identity based conference key distribution scheme from parings
    Li, SQ
    Chen, KF
    Li, XX
    Lu, RX
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 845 - 852
  • [3] A new identity-based conference key distribution scheme
    Xu, SB
    van Tilborg, H
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 269 - 269
  • [4] Scheme of conference key distribution based upon user's identity
    Hsi An Chiao Tung Ta Hsueh, 8 (105-108, 119):
  • [6] Efficient Pairwise Key Establishment Scheme Based on Random Pre-distribution Keys in WSN
    Wang, Hao
    Yang, Jian
    Wang, Ping
    Tu, Pu
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 3, PROCEEDINGS, 2010, 6018 : 291 - 304
  • [7] An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks
    Rasheed, Amar
    Mahapatra, Rabi
    2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 264 - 270
  • [8] Identity-based conference key distribution scheme using sealed lock
    Cai, Yongquan
    Li, Xiuying
    7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 282 - +
  • [9] A General Scheme for the Pre-Distribution of Keys
    S. V. Belim
    S. Yu. Belim
    Automatic Control and Computer Sciences, 2020, 54 : 860 - 863
  • [10] A General Scheme for the Pre-Distribution of Keys
    Belim, S., V
    Belim, S. Yu
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 860 - 863