Key Certificate

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 12933 Experts worldwide ranked by ideXlab platform

Xue Min Shen - One of the best experts on this subject based on the ideXlab platform.

  • Investigating Public-Key Certificate Revocation in Smart Grid
    IEEE Internet of Things Journal, 2015
    Co-Authors: Mohamed Mahmoud, Kemal Akkaya, Jelena Misic, Xue Min Shen
    Abstract:

    The public Key cryptography (PKC) is essential for securing many applications in smart grid. For the secure use of the PKC, Certificate revocation schemes tailored to smart grid applications should be adopted. However, little work has been done to study Certificate revocation in smart grid. In this paper, we first explain different motivations that necessitate revoking Certificates in smart grid. We also identify the applications that can be secured by PKC and thus need Certificate revocation. Then, we explain existing Certificate revocation schemes and define several metrics to assess them. Based on this assessment, we identify the applications that are proper for each scheme and discuss how the schemes can be modified to fully satisfy the requirements of its potential applications. Finally, we study Certificate revocation in pseudonymous public Key infrastructure (PPKI), where a large number of certified public/private Keys are assigned for each node to preserve privacy. We target vehicles-to-grid communications as a potential application. Certificate revocation in this application is a challenge because of the large number of Certificates. We discuss an efficient Certificate revocation scheme for PPKI, named compressed Certificate revocation lists (CRLs). Our analytical results demonstrate that one revocation scheme cannot satisfy the overhead/security requirements of all smart grid applications. Rather, different schemes should be employed for different applications. Moreover, we used simulations to measure the overhead of the schemes.

  • efficient public Key Certificate revocation schemes for smart grid
    Global Communications Conference, 2013
    Co-Authors: Mohamed Mahmoud, Jelena Misic, Xue Min Shen
    Abstract:

    The public Key cryptography will play an essential role in securing the smart grid communications. For the secure use of the public Key cryptography, an efficient and secure Certificate revocation scheme specially tailored to smart grid architecture should be adopted. In this paper, we study Certificate revocation in smart grid and design efficient and scalable Certificate revocation schemes. The schemes have different security strengths and require different overhead levels. We also propose an efficient Certificate revocation scheme for pseudonymous public Key infrastructure using compressed Certificate revocation lists. Analytical results demonstrate that using revocation schemes is essential for securing smart grid, and the proposed schemes are secure. Moreover, simulation results demonstrate that the proposed schemes require low overhead.

  • GLOBECOM - Efficient public-Key Certificate revocation schemes for smart grid
    2013 IEEE Global Communications Conference (GLOBECOM), 2013
    Co-Authors: Mohamed Mahmoud, Jelena Misic, Xue Min Shen
    Abstract:

    The public Key cryptography will play an essential role in securing the smart grid communications. For the secure use of the public Key cryptography, an efficient and secure Certificate revocation scheme specially tailored to smart grid architecture should be adopted. In this paper, we study Certificate revocation in smart grid and design efficient and scalable Certificate revocation schemes. The schemes have different security strengths and require different overhead levels. We also propose an efficient Certificate revocation scheme for pseudonymous public Key infrastructure using compressed Certificate revocation lists. Analytical results demonstrate that using revocation schemes is essential for securing smart grid, and the proposed schemes are secure. Moreover, simulation results demonstrate that the proposed schemes require low overhead.

Mohamed Mahmoud - One of the best experts on this subject based on the ideXlab platform.

  • Investigating Public-Key Certificate Revocation in Smart Grid
    IEEE Internet of Things Journal, 2015
    Co-Authors: Mohamed Mahmoud, Kemal Akkaya, Jelena Misic, Xue Min Shen
    Abstract:

    The public Key cryptography (PKC) is essential for securing many applications in smart grid. For the secure use of the PKC, Certificate revocation schemes tailored to smart grid applications should be adopted. However, little work has been done to study Certificate revocation in smart grid. In this paper, we first explain different motivations that necessitate revoking Certificates in smart grid. We also identify the applications that can be secured by PKC and thus need Certificate revocation. Then, we explain existing Certificate revocation schemes and define several metrics to assess them. Based on this assessment, we identify the applications that are proper for each scheme and discuss how the schemes can be modified to fully satisfy the requirements of its potential applications. Finally, we study Certificate revocation in pseudonymous public Key infrastructure (PPKI), where a large number of certified public/private Keys are assigned for each node to preserve privacy. We target vehicles-to-grid communications as a potential application. Certificate revocation in this application is a challenge because of the large number of Certificates. We discuss an efficient Certificate revocation scheme for PPKI, named compressed Certificate revocation lists (CRLs). Our analytical results demonstrate that one revocation scheme cannot satisfy the overhead/security requirements of all smart grid applications. Rather, different schemes should be employed for different applications. Moreover, we used simulations to measure the overhead of the schemes.

  • efficient public Key Certificate revocation schemes for smart grid
    Global Communications Conference, 2013
    Co-Authors: Mohamed Mahmoud, Jelena Misic, Xue Min Shen
    Abstract:

    The public Key cryptography will play an essential role in securing the smart grid communications. For the secure use of the public Key cryptography, an efficient and secure Certificate revocation scheme specially tailored to smart grid architecture should be adopted. In this paper, we study Certificate revocation in smart grid and design efficient and scalable Certificate revocation schemes. The schemes have different security strengths and require different overhead levels. We also propose an efficient Certificate revocation scheme for pseudonymous public Key infrastructure using compressed Certificate revocation lists. Analytical results demonstrate that using revocation schemes is essential for securing smart grid, and the proposed schemes are secure. Moreover, simulation results demonstrate that the proposed schemes require low overhead.

  • GLOBECOM - Efficient public-Key Certificate revocation schemes for smart grid
    2013 IEEE Global Communications Conference (GLOBECOM), 2013
    Co-Authors: Mohamed Mahmoud, Jelena Misic, Xue Min Shen
    Abstract:

    The public Key cryptography will play an essential role in securing the smart grid communications. For the secure use of the public Key cryptography, an efficient and secure Certificate revocation scheme specially tailored to smart grid architecture should be adopted. In this paper, we study Certificate revocation in smart grid and design efficient and scalable Certificate revocation schemes. The schemes have different security strengths and require different overhead levels. We also propose an efficient Certificate revocation scheme for pseudonymous public Key infrastructure using compressed Certificate revocation lists. Analytical results demonstrate that using revocation schemes is essential for securing smart grid, and the proposed schemes are secure. Moreover, simulation results demonstrate that the proposed schemes require low overhead.

Jelena Misic - One of the best experts on this subject based on the ideXlab platform.

  • Investigating Public-Key Certificate Revocation in Smart Grid
    IEEE Internet of Things Journal, 2015
    Co-Authors: Mohamed Mahmoud, Kemal Akkaya, Jelena Misic, Xue Min Shen
    Abstract:

    The public Key cryptography (PKC) is essential for securing many applications in smart grid. For the secure use of the PKC, Certificate revocation schemes tailored to smart grid applications should be adopted. However, little work has been done to study Certificate revocation in smart grid. In this paper, we first explain different motivations that necessitate revoking Certificates in smart grid. We also identify the applications that can be secured by PKC and thus need Certificate revocation. Then, we explain existing Certificate revocation schemes and define several metrics to assess them. Based on this assessment, we identify the applications that are proper for each scheme and discuss how the schemes can be modified to fully satisfy the requirements of its potential applications. Finally, we study Certificate revocation in pseudonymous public Key infrastructure (PPKI), where a large number of certified public/private Keys are assigned for each node to preserve privacy. We target vehicles-to-grid communications as a potential application. Certificate revocation in this application is a challenge because of the large number of Certificates. We discuss an efficient Certificate revocation scheme for PPKI, named compressed Certificate revocation lists (CRLs). Our analytical results demonstrate that one revocation scheme cannot satisfy the overhead/security requirements of all smart grid applications. Rather, different schemes should be employed for different applications. Moreover, we used simulations to measure the overhead of the schemes.

  • efficient public Key Certificate revocation schemes for smart grid
    Global Communications Conference, 2013
    Co-Authors: Mohamed Mahmoud, Jelena Misic, Xue Min Shen
    Abstract:

    The public Key cryptography will play an essential role in securing the smart grid communications. For the secure use of the public Key cryptography, an efficient and secure Certificate revocation scheme specially tailored to smart grid architecture should be adopted. In this paper, we study Certificate revocation in smart grid and design efficient and scalable Certificate revocation schemes. The schemes have different security strengths and require different overhead levels. We also propose an efficient Certificate revocation scheme for pseudonymous public Key infrastructure using compressed Certificate revocation lists. Analytical results demonstrate that using revocation schemes is essential for securing smart grid, and the proposed schemes are secure. Moreover, simulation results demonstrate that the proposed schemes require low overhead.

  • GLOBECOM - Efficient public-Key Certificate revocation schemes for smart grid
    2013 IEEE Global Communications Conference (GLOBECOM), 2013
    Co-Authors: Mohamed Mahmoud, Jelena Misic, Xue Min Shen
    Abstract:

    The public Key cryptography will play an essential role in securing the smart grid communications. For the secure use of the public Key cryptography, an efficient and secure Certificate revocation scheme specially tailored to smart grid architecture should be adopted. In this paper, we study Certificate revocation in smart grid and design efficient and scalable Certificate revocation schemes. The schemes have different security strengths and require different overhead levels. We also propose an efficient Certificate revocation scheme for pseudonymous public Key infrastructure using compressed Certificate revocation lists. Analytical results demonstrate that using revocation schemes is essential for securing smart grid, and the proposed schemes are secure. Moreover, simulation results demonstrate that the proposed schemes require low overhead.

Xin Li - One of the best experts on this subject based on the ideXlab platform.

  • INFOCOM - Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching
    IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, 2019
    Co-Authors: Minmei Wang, Chen Qian, Xin Li
    Abstract:

    Public-Key Certificate validation is an important building block for various security protocols for IoT devices, such as secure channel establishment, handshaking, verifying sensing data authenticity from cloud storage, and Blockchains. However, certification validation incurs non-trivial overhead on resource-constrained IoT devices, because it either requires long latency or large cache space. This work proposes to utilize the power of distributed caching and explores the feasibility of using the cache spaces on all IoT devices as a large pool to store validated Certificates. We design a Collaborative Certificate Validation (CCV) protocol including a memory-efficient and fast locator for Certificate holders, a trust model to evaluate the trustworthiness of devices, and a protocol suite for dynamic update and Certificate revocation. Evaluation results show that CCV only uses less than 25% validation time and reduces >90% decryption operations on each device, compared to a recent method. Malicious devices that conduct dishonest validations can be detected by the network using the proposed trust model.

  • Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching
    IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, 2019
    Co-Authors: Minmei Wang, Chen Qian, Xin Li
    Abstract:

    Public-Key Certificate validation is an important building block for various security protocols for IoT devices, such as secure channel establishment, handshaking, verifying sensing data authenticity from cloud storage, and Blockchains. However, certification validation incurs non-trivial overhead on resource-constrained IoT devices, because it either requires long latency or large cache space. This work proposes to utilize the power of distributed caching and explores the feasibility of using the cache spaces on all IoT devices as a large pool to store validated Certificates. We design a Collaborative Certificate Validation (CCV) protocol including a memory-efficient and fast locator for Certificate holders, a trust model to evaluate the trustworthiness of devices, and a protocol suite for dynamic update and Certificate revocation. Evaluation results show that CCV only uses less than 25% validation time and reduces >90% decryption operations on each device, compared to a recent method. Malicious devices that conduct dishonest validations can be detected by the network using the proposed trust model.

Abdelmadjid Bouabdallah - One of the best experts on this subject based on the ideXlab platform.

  • Lightweight Identity-based Authentication Protocol for Wireless Sensor Networks
    International Journal of Information and Computer Security, 2016
    Co-Authors: Farah-sarah Ouada, Omar Mawloud, Abdelmadjid Bouabdallah, Abdelkamel Tari
    Abstract:

    Wireless Sensor Networks (WSNs) are often deployed in hostile environments making them vulnerable to attacks. A WSN comprises a large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in WSNs. Hence, it is necessary to balance between security requirements and energy consumption. In this paper, we propose a lightweight public-Key based authentication protocol for WSNs. Our protocol uses identity-based encryption in order to lighten the energy consumption from the public-Key Certificate management. We have developed two variations of the proposed solution depending on the manner and when an attack should be detected. We perform an overall evaluation of our approach through simulations. The results indicate out performance of our approach in terms of energy consumption while providing effective security.

  • Reliable and fully distributed trust model for mobile ad hoc networks
    Computers & Security, 2009
    Co-Authors: Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah
    Abstract:

    International audienceA mobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in MANETs is compulsory to guarantee a widespread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. Our work aims to provide a fully distributed trust model for mobile ad hoc networks. In this paper, we propose a fully distributed public Key Certificate management system based on trust graphs and threshold cryptography. It permits users to issue public Key Certificates, and to perform authentication via Certificates' chains without any centralized management or trusted authorities. Moreover, thanks to the use of threshold cryptography; our system resists against false public Keys certification. We perform an overall evaluation of our proposed approach through simulations. The results indicate out performance of our approach while providing effective security

  • Fully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks
    2008
    Co-Authors: Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah
    Abstract:

    A mobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in MANETs is compulsory to guarantee a wide spread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. Our work aims to provide a fully distributed trust model for mobile ad hoc networks. In this paper, we propose a fully distributed public Key Certificate management system based on trust graphs and threshold cryptography. It permits users to issue public Key Certificates, and to perform authentication via Certificates’ chains without any centralized management or trusted authorities. Moreover, thanks to the use of threshold cryptography; our system resists against false public Keys certification. We perform an overall evaluation of our proposed approach through simulations. The results indicate out performance of our approach while providing eective security.