Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2020

01.12.2020

A General Scheme for the Pre-Distribution of Keys

verfasst von: S. V. Belim, S. Yu. Belim

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2020

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose a generalized scheme for the predistribution of keys. Calculations are performed in an arbitrary vector space. Key materials are formed based on vector space elements and symmetric operator over a vector space. Two particular cases of application of the proposed scheme are considered.
Literatur
1.
Zurück zum Zitat Konoplev, A.G., Busygin, and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017–1021.CrossRef Konoplev, A.G., Busygin, and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017–1021.CrossRef
2.
Zurück zum Zitat Busygin, A., Konoplev, A., Kalinin, M., and Zegzhda, D., Floating genesis block enhancement for blockchain based routing between connected vehicles and software-defined VANET security services, SIN '18: Proceedings of the 11th International Conference on Security of Information and Networks, 2018. https://doi.org/10.1145/3264437.3264463 Busygin, A., Konoplev, A., Kalinin, M., and Zegzhda, D., Floating genesis block enhancement for blockchain based routing between connected vehicles and software-defined VANET security services, SIN '18: Proceedings of the 11th International Conference on Security of Information and Networks, 2018. https://​doi.​org/​10.​1145/​3264437.​3264463
3.
Zurück zum Zitat Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 277–284. Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 277–284.
4.
Zurück zum Zitat Shenets, N.N., Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 936–946.CrossRef Shenets, N.N., Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 936–946.CrossRef
5.
Zurück zum Zitat Shenets, N.N., Security infrastructure of FANET based on secret sharing and authenticated encryption, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 857–864.CrossRef Shenets, N.N., Security infrastructure of FANET based on secret sharing and authenticated encryption, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 857–864.CrossRef
6.
Zurück zum Zitat Aleksandrova, E.B., Shkorkina, E.N., and Kalinin, M.O., Organization of the quantum cryptographic keys distribution system for transportation infrastructure users, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 969–971.CrossRef Aleksandrova, E.B., Shkorkina, E.N., and Kalinin, M.O., Organization of the quantum cryptographic keys distribution system for transportation infrastructure users, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 969–971.CrossRef
7.
Zurück zum Zitat Aleksandrova, E.B., Yarmak, A.V., and Kalinin, M.O., Analysis of approaches to group authentication in large-scale industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 879–882.CrossRef Aleksandrova, E.B., Yarmak, A.V., and Kalinin, M.O., Analysis of approaches to group authentication in large-scale industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 879–882.CrossRef
8.
Zurück zum Zitat Aleksandrova, E.B., Shtyrkina, A.A., and Iarmak, A.V., Post-quantum primitives in information security, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 269–276. Aleksandrova, E.B., Shtyrkina, A.A., and Iarmak, A.V., Post-quantum primitives in information security, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 269–276.
9.
Zurück zum Zitat Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948–956.CrossRef Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948–956.CrossRef
10.
Zurück zum Zitat Zegzhda, P.D., Ivanov, D.V., Moskvin, D.A., and Kubrin, G.S., Actual security threats for vehicular and mobile ad hoc networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 993–999.CrossRef Zegzhda, P.D., Ivanov, D.V., Moskvin, D.A., and Kubrin, G.S., Actual security threats for vehicular and mobile ad hoc networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 993–999.CrossRef
12.
Zurück zum Zitat Belenko, V., Chernenko, V., Krundyshev, V., and Kalinin, M., Data-driven failure analysis for the cyber physical infrastructures, 2019 IEEE International Conference on Industrial Cyber Physical Systems, 2019, pp. 775–779. Belenko, V., Chernenko, V., Krundyshev, V., and Kalinin, M., Data-driven failure analysis for the cyber physical infrastructures, 2019 IEEE International Conference on Industrial Cyber Physical Systems, 2019, pp. 775–779.
14.
Zurück zum Zitat Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73–79. Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73–79.
15.
Zurück zum Zitat Blom, R., An optimal class of symmetric key generation systems, Advances in Cryptology, Workshop on the Theory and Application of of Cryptographic Techniques, Paris, 1984, pp. 335–338. Blom, R., An optimal class of symmetric key generation systems, Advances in Cryptology, Workshop on the Theory and Application of of Cryptographic Techniques, Paris, 1984, pp. 335–338.
16.
17.
Zurück zum Zitat Divya, R. and Thirumurugan, T.A., Novel dynamic key management scheme based on hamming distance for wireless sensor networks, Int. J. Sci. Eng. Res., 2011, vol. 2, no. 5, pp. 1–7. Divya, R. and Thirumurugan, T.A., Novel dynamic key management scheme based on hamming distance for wireless sensor networks, Int. J. Sci. Eng. Res., 2011, vol. 2, no. 5, pp. 1–7.
18.
Zurück zum Zitat Eschenauer, L. and Gligor, V.D., A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and Communication Security, 2002, pp. 41–47. Eschenauer, L. and Gligor, V.D., A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and Communication Security, 2002, pp. 41–47.
19.
Zurück zum Zitat Chan, H., Perrig, A., and Song, D., Random key pre-distribution schemes for sensor networks, Proceedings of IEEE Symposium on Security and Privacy, 2003, pp. 197–213. Chan, H., Perrig, A., and Song, D., Random key pre-distribution schemes for sensor networks, Proceedings of IEEE Symposium on Security and Privacy, 2003, pp. 197–213.
20.
Zurück zum Zitat Belim, S.V. and Belim, S.Yu., KDP scheme of preliminary key distribution in discretionary security policy, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 773–776.CrossRef Belim, S.V. and Belim, S.Yu., KDP scheme of preliminary key distribution in discretionary security policy, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 773–776.CrossRef
21.
Zurück zum Zitat Belim, S.V. and Belim, S.Yu., Use the keys pre-distribution KDP-scheme for mandatory access control implementation, J. Phys.: Conf. Ser., 2019, vol. 1210. Belim, S.V. and Belim, S.Yu., Use the keys pre-distribution KDP-scheme for mandatory access control implementation, J. Phys.: Conf. Ser., 2019, vol. 1210.
22.
Zurück zum Zitat Belim, S.V. and Belim, S.Yu., Mandatory access control implementation in the distributed systems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1124–1126.CrossRef Belim, S.V. and Belim, S.Yu., Mandatory access control implementation in the distributed systems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1124–1126.CrossRef
23.
Zurück zum Zitat Belim, S.V. and Belim, S.Yu., The modification of Blom’s key predistribution scheme taken into account simplex channels, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1134–1137.CrossRef Belim, S.V. and Belim, S.Yu., The modification of Blom’s key predistribution scheme taken into account simplex channels, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1134–1137.CrossRef
24.
Zurück zum Zitat Belim, S.V. and Belim, S.Yu., Implementation of simplex channels in the Blom’s keys pre-distribution scheme, J. Phys.: Conf. Ser., 2019, vol. 1210. Belim, S.V. and Belim, S.Yu., Implementation of simplex channels in the Blom’s keys pre-distribution scheme, J. Phys.: Conf. Ser., 2019, vol. 1210.
Metadaten
Titel
A General Scheme for the Pre-Distribution of Keys
verfasst von
S. V. Belim
S. Yu. Belim
Publikationsdatum
01.12.2020
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2020
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620080088

Weitere Artikel der Ausgabe 8/2020

Automatic Control and Computer Sciences 8/2020 Zur Ausgabe

Neuer Inhalt