The Subset Keys and Identity Tickets (SKIT) Key Distribution Scheme

被引:3
|
作者
Ramkumar, Mahalingam [1 ]
机构
[1] Mississippi State Univ, Dept Comp Sci & Engn, Mississippi State, MS 39762 USA
关键词
Key distribution; message injection attacks; probabilistic key distribution;
D O I
10.1109/TIFS.2009.2039603
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Probabilistic key predistribution schemes (P-KPSs) which place modest demands on hardware are good candidates for securing interactions between resource limited computers. Collusion susceptible P-KPSs are trade-offs between security and complexity. Some facets of complexity include computation, bandwidth, and storage overhead. Metrics for security include resistance to passive eavesdropping attacks, and active message injection attacks. The contributions of this paper are three-fold: 1) a novel P-KPS, the subset keys and identity tickets (SKIT) scheme; 2) a generic KPS model to facilitate comparison of various facets of the complexity of key predistribution schemes; and 3) a new security model to describe the resistance of P-KPSs to active message-injection attacks. The two models are used to show why SKIT has many compelling advantages over existing P-KPSs in the literature. In particular, while placing lower demands on computation, bandwidth and storage overhead, SKIT realizes substantial improvements in resistance to passive and active attacks.
引用
收藏
页码:39 / 51
页数:13
相关论文
共 50 条
  • [31] A key distribution scheme with authentication for ZigBee
    Yu, Bin
    Yang, Tong-Hao
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (09): : 2277 - 2281
  • [32] A Scheme of Key Distribution in Smart Grid
    Zhou Youwu
    Liu Mingjun
    Ye Aimin
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 1 - 6
  • [33] Identity Based Broadcast Encryption Scheme with Shorter Decryption Keys for Open Networks
    Mishra, Pragya
    Renuka
    Verma, Vandani
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (02) : 961 - 969
  • [34] Identity Based Broadcast Encryption Scheme with Shorter Decryption Keys for Open Networks
    Pragya Mishra
    Vandani Renuka
    Wireless Personal Communications, 2020, 115 : 961 - 969
  • [35] A Multiple Paths Scheme with Labels for Key Distribution on Quantum Key Distribution Network
    Ma, Chenhui
    Guo, Yixi
    Su, Jinhai
    2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 2513 - 2517
  • [36] Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
    Dong Y.-D.
    Peng J.-Y.
    Zhang X.-B.
    Zhang Z.-L.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (02): : 151 - 156
  • [37] Secured Key Distribution Scheme for Cryptographic Key Management System
    Khaing, Kyawt Kyawt
    Aung, Khin Mi Mi
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 481 - 486
  • [38] Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast
    Kim, Jihye
    Lee, Seunghwa
    Lee, Jiwon
    Oh, Hyunok
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1593 - 1600
  • [39] Scrambling and key distribution scheme for digital television
    Kanjanarin, W
    Amornraksa, T
    NINTH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, PROCEEDINGS, 2001, : 140 - 145
  • [40] An Efficient Key Distribution Scheme in Cloud Computing
    Tang, Chumming
    Wong, Duncan S.
    Hu, Xing
    Pei, Dingyi
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,