Key storage in secure networks
نویسندگان
چکیده
In this paper the key storage problem associated with the provision of secure communications between every pair of users in a large network is described, and a possible method of alleviating the problem is discussed. This method, based on the use of finite incidence structures with special properties called key distribution patterns, is shown to generalize earlier work in the area. The more general formulation of the storage saving scheme contained here enables use to be made of the extensive body of knowledge already existing on the theory of block designs. From this theory we are able to extract a number of new families of examples of potentially useful key distribution systems.
منابع مشابه
An efficient solution for management of pre-distribution in wireless sensor networks
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملEnhancement of Hierarchical Key Management Scheme of Secure Multicast Transmission for Overlay Networks
Group communication security is needed to protect sensitive information. A group key is shared by all users under secure group communication model. The group key is used to encrypt data transmitted to the group. The group membership is dynamic and requires new key for membership changes. Secure multicast transmission schemes are used to transfer data to a set of nodes. Membership in secure mult...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Discrete Applied Mathematics
دوره 21 شماره
صفحات -
تاریخ انتشار 1988