The Subset Keys and Identity Tickets (SKIT) Key Distribution Scheme

被引:3
|
作者
Ramkumar, Mahalingam [1 ]
机构
[1] Mississippi State Univ, Dept Comp Sci & Engn, Mississippi State, MS 39762 USA
关键词
Key distribution; message injection attacks; probabilistic key distribution;
D O I
10.1109/TIFS.2009.2039603
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Probabilistic key predistribution schemes (P-KPSs) which place modest demands on hardware are good candidates for securing interactions between resource limited computers. Collusion susceptible P-KPSs are trade-offs between security and complexity. Some facets of complexity include computation, bandwidth, and storage overhead. Metrics for security include resistance to passive eavesdropping attacks, and active message injection attacks. The contributions of this paper are three-fold: 1) a novel P-KPS, the subset keys and identity tickets (SKIT) scheme; 2) a generic KPS model to facilitate comparison of various facets of the complexity of key predistribution schemes; and 3) a new security model to describe the resistance of P-KPSs to active message-injection attacks. The two models are used to show why SKIT has many compelling advantages over existing P-KPSs in the literature. In particular, while placing lower demands on computation, bandwidth and storage overhead, SKIT realizes substantial improvements in resistance to passive and active attacks.
引用
收藏
页码:39 / 51
页数:13
相关论文
共 50 条
  • [21] Evaluation of Key Management Scheme Based on Identity
    Ramesh, Ch.
    Rao, K. Venu Gopal
    Vasumathi, D.
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 545 - 550
  • [22] Equivalent keys of medium field multivariate public key encryption scheme
    Wang, Xin
    Sun, Chen
    Wang, Xinmei
    Journal of Computational Information Systems, 2009, 5 (05): : 1403 - 1408
  • [23] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption
    Liu, Yan
    Wu, Xiumei
    Chen, Xuemin
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
  • [24] Secure quantum key distribution with a subset of malicious devices
    Zapatero, Victor
    Curty, Marcos
    NPJ QUANTUM INFORMATION, 2021, 7 (01)
  • [25] An Efficient Self-healing Key Distribution Scheme with Constant-size Personal Keys for Wireless Sensor Networks
    Han, Song
    Tian, Biming
    Zhang, Y.
    Hu, J.
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
  • [26] Secure quantum key distribution with a subset of malicious devices
    Víctor Zapatero
    Marcos Curty
    npj Quantum Information, 7
  • [27] Identity verification in quantum key distribution
    Zeng, Guihua
    Zhang, Weiping
    2000, American Physical Society (61):
  • [28] Identity verification in quantum key distribution
    Zeng, GH
    Zhang, WP
    PHYSICAL REVIEW A, 2000, 61 (02): : 5
  • [29] A Novel Scheme for On-demand Distribution of Secure Element Keys
    Alimi, Vincent
    WORLD CONGRESS ON COMPUTER & INFORMATION TECHNOLOGY (WCCIT 2013), 2013,
  • [30] Key Management Techniques for Controlling the Distribution and Update of Cryptographic keys
    Lalith, T.
    Umarani, R.
    Kadharnawaz, G. M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2010, 1 (06) : 163 - 166