首页> 外文OA文献 >Combinatorial Designs For Key Distribution And Secure Re-Keying In Group Communication Systems
【2h】

Combinatorial Designs For Key Distribution And Secure Re-Keying In Group Communication Systems

机译:群组通信系统中密钥分发和安全重新加密的组合设计

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Combinatorial t-designs are a class of highly regular set systems subject to interesting incidence conditions. These objects have been found to be very useful in applications ranging from tournament scheduling to traffic routing in communication networks. In the work presented here, we use a particularly nicely-structured class of combinatorial designs, known as symmetric 2-designs, to solve a problem concerning secure re-keying in a wireless communication system after the ejection of one or more users from the network. We show that employing a symmetric 2-design as a key distribution in this type of system provides a number of benefits, including collusion prevention and provably light loads for the base station to execute necessary secure re-keying operations. We show that a class of symmetric 2-design key distribution allows for minimal re-keying procedures after multiple simultaneous user ejections and that this problem is NP-hard for arbitrary key distributions. For cases where the structure of symmetric 2-designs is insufficient to make these strong claims, we present a novel algorithm for identifying a collection of keys sufficient to re-key a network after any number of ejections. We provide simulation results to show that for symmetric 2-design key distributions this algorithm performs significantly better than existing solutions. To make these guarantees, we draw connections between combinatorial designs, cover-free families and various key distribution methodologies. We conclude by presenting a sample application of this machinery, namely the advanced metering infrastructure being deployed to monitor end-user electricity consumption as part of the smart grid. The wireless sensors employed in this scheme have tight constraints on memory, computation and power, and so symmetric encryption is a natural choice for data security. The distribution of the cryptographic keys necessary for these operations is difficult, and fluid group membership further complicates the problem. The widespread adoption of AMI has the potential to significantly increase the efficiency of the power distribution network. The acceptability of AMI to consumers is directly tied to their perceived security; a robust infrastructure is necessary to assure consumers of the protection of their personal information.
机译:组合t设计是一类高度规则的集系统,它受有趣的入射条件的影响。已经发现这些对象在从比赛调度到通信网络中的业务路由的应用中非常有用。在这里介绍的工作中,我们使用结构特别好的一类组合设计(称为对称2设计)来解决一个或多个用户从网络中退出后在无线通信系统中进行安全密钥更新的问题。 。我们显示出,在这种类型的系统中采用对称2设计作为密钥分配具有许多好处,包括防止串通,并为基站执行必要的安全密钥更新操作提供了可证明的轻负载。我们显示出一类对称的2-design密钥分配允许在多次同时弹出用户后进行最少的重新键入密钥的过程,并且对于任意密钥分配,此问题都是NP-hard问题。对于对称2设计的结构不足以做出这些有力主张的情况,我们提出了一种新颖的算法,用于识别足以在任意次数的弹出后重新对网络进行密钥化的密钥集合。我们提供的仿真结果表明,对于对称2设计密钥分配,该算法的性能明显优于现有解决方案。为了获得这些保证,我们在组合设计,无封面系列和各种关键分发方法之间建立了联系。最后,我们通过介绍此机器的示例应用程序,即作为智能电网的一部分,部署先进的计量基础架构来监视最终用户的用电量。此方案中使用的无线传感器对内存,计算和功能有严格的限制,因此对称加密是数据安全性的自然选择。这些操作所需的密码密钥的分配是困难的,并且流体组成员资格进一步使问题复杂化。 AMI的广泛采用有可能显着提高配电网络的效率。 AMI对消费者的可接受性直接与他们认为的安全性有关;必须有一个强大的基础架构来确保消费者对其个人信息的保护。

著录项

  • 作者

    Karst Nathaniel;

  • 作者单位
  • 年度 2011
  • 总页数
  • 原文格式 PDF
  • 正文语种 en_US
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号