Key Management Protocol

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 17943 Experts worldwide ranked by ideXlab platform

Rama C Krishna - One of the best experts on this subject based on the ideXlab platform.

  • an efficient distributed group Key Management using hierarchical approach with elliptic curve cryptography
    Computational Intelligence, 2015
    Co-Authors: Shikha Sharma, Rama C Krishna
    Abstract:

    Secure and reliable group communication is an active area of research. Its popularity is fuelled by the growing importance of group-oriented and collaborative properties. The central research challenge is secure and efficient group Key Management. In this paper, we propose an efficient many-to-many group Key Management Protocol in distributed group communication. This Protocol is based on Elliptic Curve Cryptography and decrease the Key length while providing securities at the same level as that of other cryptosystems provides. The main issue in secure group communication is group dynamics and Key Management. A scalable secure group communication model ensures that whenever there is a membership change, a new group Key is computed and distributed to the group members with minimal communication and computation cost. This paper explores the use of batching of group membership changes to reduce the time and Key re-distribution operations. The features of ECC Protocol are that, no Keys are exchanged between existing members at join, and only one Key, the group Key, is delivered to remaining members at leave. In the security analysis, our proposed algorithm takes less time when users join or leave the group in comparison to existing one. In ECC, there is only 1 Key generation and Key encryption overhead at join and leave operation. At join the communication overhead is Key size of a node and at leave operation is 2 log2 n -- 2 × Key size of a node.

Victor C. M. Leung - One of the best experts on this subject based on the ideXlab platform.

  • Efficient Authentication and Key Management Mechanisms for Smart Grid Communications
    IEEE Systems Journal, 2014
    Co-Authors: Hasen Nicanfar, Paria Jokar, Konstantin Beznosov, Victor C. M. Leung
    Abstract:

    A smart grid (SG) consists of many subsystems and networks, all working together as a system of systems, many of which are vulnerable and can be attacked remotely. Therefore, security has been identified as one of the most challenging topics in SG development, and designing a mutual authentication scheme and a Key Management Protocol is the first important step. This paper proposes an efficient scheme that mutually authenticates a smart meter of a home area network and an authentication server in SG by utilizing an initial password, by decreasing the number of steps in the secure remote password Protocol from five to three and the number of exchanged packets from four to three. Furthermore, we propose an efficient Key Management Protocol based on our enhanced identity-based cryptography for secure SG communications using the public Key infrastructure. Our proposed mechanisms are capable of preventing various attacks while reducing the Management overhead. The improved efficiency for Key Management is realized by periodically refreshing all public/private Key pairs as well as any multicast Keys in all the nodes using only one newly generated function broadcasted by the Key generator entity. Security and performance analyses are presented to demonstrate these desirable attributes.

  • smart grid authentication and Key Management for unicast and multicast communications
    IEEE PES Innovative Smart Grid Technologies Conference, 2011
    Co-Authors: Hasen Nicanfar, Paria Jokar, Victor C. M. Leung
    Abstract:

    One of the most important and challenging area in the smart grid context is security and privacy section. Smart grid is a vulnerable system and can be attacked even from aboard, attacks that may cause different level of issues and harms on the devices and society. So, research community has paid attention to this topic and the reasons of required security and privacy for the smart grid. The first step of designing and implementing security for any system such as a smart grid is an authentication scheme followed by a Key Management Protocol. Other security aspects like integrity, authorization and confidentiality can be implemented as long as a strong Key Management Protocol has already been designed and addressed.

Hisham Kanaan - One of the best experts on this subject based on the ideXlab platform.

  • alms asymmetric lightweight centralized group Key Management Protocol for vanets
    IEEE Transactions on Intelligent Transportation Systems, 2021
    Co-Authors: Ahmad Mansour, Khalid Mahmood Malik, Ahmed Alkaff, Hisham Kanaan
    Abstract:

    Vehicular ad hoc networks (VANETs) were initially designed to assist in traffic Management and delivery of safety messages. Due to the significant evolution in modern vehicles, the features offered by VANETs have expanded to include comfort and entertainment relevant services. This expansion has further increased the need to secure them. The security of VANETs is mainly dependent on sharing a cryptographic group Key confidentially. Due to the frequent change in group membership, there is a need to update the group Key repeatedly, which is difficult in highly dynamic networks like VANETs. Therefore, designing a secure, scalable, and efficient group Key Management Protocol is challenging. Existing group Key Management Protocols introduce a variety of limitations, including high computational cost for both group Key computation and retrieval, additional computational and communication overhead when the membership in the group changes, and collusion among receiving vehicles. To overcome these limitations, this paper introduces a novel group Key Management Protocol, $ALMS$ . Performance analysis reveals that, compared to existing Protocols, $ALMS$ is more scalable since it introduces a low computational overhead for both the Trusted Authority (TA) and the receiving vehicles. Also, it does not suffer from the Key distribution limitation as symmetric Key Management Protocols do. Moreover, $ALMS$ introduces only a light overhead on the TA for group membership change. This is achieved by decoupling the initialization from group Key computation and performing it offline without affecting the size of the encrypted group Key.

Tang Shaohua - One of the best experts on this subject based on the ideXlab platform.

  • group Key Management Protocol by using geometric approach and binary Key tree
    Computer Science, 2009
    Co-Authors: Tang Shaohua
    Abstract:

    Many emerging applications are based upon a group communications model.A new group Key Management scheme for a secure group communication system based on a geometric approach was proposed.The proposed scheme can be divided into three phases:user registration,group Key assignment,and group Key computation.In the user registration phase,the group manager computes and gives a secret to the new user based on geometric approaches over a secure channel.In the group Key assignment phase,the group manager first constructs a secret circle using the group Key.Then it computes a shadow of the group Key for each member based on the member's private Key.Finally,each member obtains an additional secret point based on his private Key.The member reconstructs the secret circle by its shadow and the public information,and then obtains the group Key in the group Key computation phase.Based on simple scheme of group Key Management,a binary tree of Keys is set up to redesign the scheme and demonstrate it.The computation complexity for reKeying decreases from O(m) to O(log(m)).The public information on the note board keeps the same.No a secure channel is needed when the group Key is updated.So this scheme is scalable.

Shikha Sharma - One of the best experts on this subject based on the ideXlab platform.

  • an efficient distributed group Key Management using hierarchical approach with elliptic curve cryptography
    Computational Intelligence, 2015
    Co-Authors: Shikha Sharma, Rama C Krishna
    Abstract:

    Secure and reliable group communication is an active area of research. Its popularity is fuelled by the growing importance of group-oriented and collaborative properties. The central research challenge is secure and efficient group Key Management. In this paper, we propose an efficient many-to-many group Key Management Protocol in distributed group communication. This Protocol is based on Elliptic Curve Cryptography and decrease the Key length while providing securities at the same level as that of other cryptosystems provides. The main issue in secure group communication is group dynamics and Key Management. A scalable secure group communication model ensures that whenever there is a membership change, a new group Key is computed and distributed to the group members with minimal communication and computation cost. This paper explores the use of batching of group membership changes to reduce the time and Key re-distribution operations. The features of ECC Protocol are that, no Keys are exchanged between existing members at join, and only one Key, the group Key, is delivered to remaining members at leave. In the security analysis, our proposed algorithm takes less time when users join or leave the group in comparison to existing one. In ECC, there is only 1 Key generation and Key encryption overhead at join and leave operation. At join the communication overhead is Key size of a node and at leave operation is 2 log2 n -- 2 × Key size of a node.