On the Specification of Symmetric Key Management Parameters for Secure Space Missions

被引:0
|
作者
Juliato, Marcio [1 ]
Gebotys, Catherine [1 ]
Sanchez, Ignacio Aguilar
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
来源
2012 IEEE FIRST AESS EUROPEAN CONFERENCE ON SATELLITE TELECOMMUNICATIONS (ESTEL) | 2012年
关键词
Space System; Security; Key Management; Symmetric Key; Cryptoperiod; Key Length;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Although the vast majority of space communications are in-the-clear, security is an emerging trend in spacecraft missions. However, key management in space has received limited attention. This work provides an approach to symmetric key management with justification of parameters. Unlike previous approaches, quantitative analysis and models are proposed. Specifically, key hierarchy, key roles, key lengths and corresponding crypto periods are specified, based upon models of known attacks, and computing power. These results are crucial in order to support future secure space missions and cryptographic modules onboard spacecrafts.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
    Wazid, Mohammad
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Conti, Mauro
    Jo, Minho
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01): : 269 - 282
  • [42] A Secure Key Management System in Group Structured Mobile Ad hoc Networks
    Chauhan, Kamal Kumar
    Tapaswi, Shashikala
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 307 - 311
  • [43] Power proximity based key management for secure multicast in ad hoc networks
    Lazos, Loukas
    Poovendran, Radha
    WIRELESS NETWORKS, 2007, 13 (01) : 127 - 148
  • [44] Design of secure key management and user authentication scheme for fog computing services
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 (475-492): : 475 - 492
  • [45] DECENT: Decentralized and Efficient Key Management to Secure Communication in Dense and Dynamic Environments
    de Ree, Marcus
    Mantas, Georgios
    Rodriguez, Jonathan
    Otung, Ifiok E.
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (07) : 7586 - 7598
  • [46] A dynamic key management paradigm for secure wireless ad hoc network communications
    Singh A.
    Tentu A.N.
    Venkaiah V.Ch.
    International Journal of Information and Computer Security, 2021, 14 (3-4) : 380 - 402
  • [47] A design of optimal key management scheme for secure and survivable wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Rong, Bo
    Tipper, David
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (01) : 75 - 82
  • [48] Power proximity based key management for secure multicast in ad hoc networks
    Loukas Lazos
    Radha Poovendran
    Wireless Networks, 2007, 13 : 127 - 148
  • [49] Fast and Secure Generating and Exchanging a Symmetric Keys with Different Key Size in TVWS
    Elmubark, Mubark A.
    Saeed, Rashid A.
    Elshaikh, M. A.
    Mokhtar, Rania A.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, CONTROL, NETWORKING, ELECTRONICS AND EMBEDDED SYSTEMS ENGINEERING (ICCNEEE), 2015, : 114 - 117
  • [50] Key management for a secure LAN-SMDS network
    Varadharajan, V
    Calvelli, C
    COMPUTER COMMUNICATIONS, 1996, 19 (9-10) : 813 - 823