کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
393484 665653 2014 16 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Symmetric Threshold Multipath (STM): An online symmetric key management scheme
کلمات کلیدی
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر هوش مصنوعی
پیش نمایش صفحه اول مقاله
Symmetric Threshold Multipath (STM): An online symmetric key management scheme
چکیده انگلیسی


• We introduced a new symmetric key management scheme.
• The keys for communication are distributed online.
• Threshold secret sharing, symmetric key management, and anonymity mechanisms are used to enhance the new scheme’s security.
• Theoretical and numerical analysis are provided for the proposed scheme.
• The results show that the proposed scheme is more secure that two related schemes.

The threshold secret sharing technique has been used extensively in cryptography. This technique is used for splitting secrets into shares and distributing the shares in a network to provide protection against attacks and to reduce the possibility of loss of information. In this paper, a new approach is introduced to enhance communication security among the nodes in a network based on the threshold secret sharing technique and traditional symmetric key management. The proposed scheme aims to enhance security of symmetric key distribution in a network. In the proposed scheme, key distribution is online which means key management is conducted whenever a message needs to be communicated. The basic idea is encrypting a message with a key (the secret) at the sender, then splitting the key into shares and sending the shares from different paths to the destination. Furthermore, a Pre-Distributed Shared Key scheme is utilized for more secure transmissions of the secret’s shares. The proposed scheme, with the exception of some offline management by the network controller, is distributed, i.e., the symmetric key setups and the determination of the communication paths is performed in the nodes. This approach enhances communication security among the nodes in a network that operates in hostile environments. The cost and security analyses of the proposed scheme are provided.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Information Sciences - Volume 268, 1 June 2014, Pages 489–504
نویسندگان
, , ,