Symmetric Threshold Multipath (STM): An online symmetric key management scheme

被引:6
作者
Boloorchi, Alireza T. [1 ]
Samadzadeh, M. H. [1 ]
Chen, T. [1 ]
机构
[1] Oklahoma State Univ, Dept Comp Sci, Stillwater, OK 74078 USA
关键词
Threshold secret sharing; Symmetric key management; Online key distribution; Multipath communication; SECURE;
D O I
10.1016/j.ins.2013.12.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The threshold secret sharing technique has been used extensively in cryptography. This technique is used for splitting secrets into shares and distributing the shares in a network to provide protection against attacks and to reduce the possibility of loss of information. In this paper, a new approach is introduced to enhance communication security among the nodes in a network based on the threshold secret sharing technique and traditional symmetric key management. The proposed scheme aims to enhance security of symmetric key distribution in a network. In the proposed scheme, key distribution is online which means key management is conducted whenever a message needs to be communicated. The basic idea is encrypting a message with a key (the secret) at the sender, then splitting the key into shares and sending the shares from different paths to the destination. Furthermore, a Pre-Distributed Shared Key scheme is utilized for more secure transmissions of the secret's shares. The proposed scheme, with the exception of some offline management by the network controller, is distributed, i.e., the symmetric key setups and the determination of the communication paths is performed in the nodes. This approach enhances communication security among the nodes in a network that operates in hostile environments. The cost and security analyses of the proposed scheme are provided. Published by Elsevier Inc.
引用
收藏
页码:489 / 504
页数:16
相关论文
共 30 条
[1]  
[Anonymous], 2005, 2 ACM INT WORKSH PER
[2]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[3]  
Chan HW, 2004, WIRELESS SENSOR NETWORKS, P277
[4]  
Crossbow Technology Inc, 2007, IMOTE HARDW MAN
[5]  
Deng HM, 2004, ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, P107
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]  
Du WL, 2004, IEEE INFOCOM SER, P586
[8]   An effective key management scheme for heterogeneous sensor networks [J].
Du, Xiaojiang ;
Xiao, Yang ;
Guizani, Mohsen ;
Chen, Hslao-Hwa .
AD HOC NETWORKS, 2007, 5 (01) :24-34
[9]  
Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117
[10]  
Gentry C, 2003, LECT NOTES COMPUT SC, V2656, P272