On the Specification of Symmetric Key Management Parameters for Secure Space Missions

被引:0
|
作者
Juliato, Marcio [1 ]
Gebotys, Catherine [1 ]
Sanchez, Ignacio Aguilar
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
来源
2012 IEEE FIRST AESS EUROPEAN CONFERENCE ON SATELLITE TELECOMMUNICATIONS (ESTEL) | 2012年
关键词
Space System; Security; Key Management; Symmetric Key; Cryptoperiod; Key Length;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Although the vast majority of space communications are in-the-clear, security is an emerging trend in spacecraft missions. However, key management in space has received limited attention. This work provides an approach to symmetric key management with justification of parameters. Unlike previous approaches, quantitative analysis and models are proposed. Specifically, key hierarchy, key roles, key lengths and corresponding crypto periods are specified, based upon models of known attacks, and computing power. These results are crucial in order to support future secure space missions and cryptographic modules onboard spacecrafts.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things
    Wazid, Mohammad
    Das, Ashok Kumar
    Shetty, Sachin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (06) : 5242 - 5257
  • [2] Key Management in Secure Satellite Multicast Using Key Hypergraphs
    Ding, Yan
    Zhou, Xian-wei
    Cheng, Zhi-mi
    Wu, Qi-wu
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (04) : 1859 - 1883
  • [3] Key Management in Secure Satellite Multicast Using Key Hypergraphs
    Yan Ding
    Xian-wei Zhou
    Zhi-mi Cheng
    Qi-wu Wu
    Wireless Personal Communications, 2013, 70 : 1859 - 1883
  • [4] Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks
    Liu, Zhongya
    Luo, Yunxiao
    PEERJ COMPUTER SCIENCE, 2023, 9
  • [5] A secure distributed symmetric key generation scheme
    Shang, Jianwei
    Li, Feng
    Zhang, Yanyan
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 375 - +
  • [6] Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks
    Liu Z.
    Luo Y.
    PeerJ Computer Science, 2023, 9
  • [7] A Reliable and Secure Hybrid Key Management Scheme for WSNs
    Tufail, Ali
    Khan, Adil Mehmood
    Kim, Ki-Hyung
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (04): : 629 - 642
  • [8] Decentralized group key management for secure multicast communications
    Peyravian, M
    Matyas, SM
    Zunic, N
    COMPUTER COMMUNICATIONS, 1999, 22 (13) : 1183 - 1187
  • [9] A Secure Key Management Model for Wireless Mesh Networks
    Gao, Li
    Chang, Elizabeth
    Parvin, Sazia
    Han, Song
    Dillon, Tharam
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 655 - 660
  • [10] The efficient secure key management structure for a scalable multicast
    Park, HU
    Lee, IY
    ISE'2001: PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON INFORMATION SYSTEMS AND ENGINEERING, 2001, : 297 - 303