An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems

Author(s):  
Saman Shojae Chaeikar ◽  
Mojtaba Alizadeh ◽  
Mohammad Hesam Tadayon ◽  
Alireza Jolfaei

Cyber Security, over the last few years, has been a topic of great research given the number of cyber crimes have been increasing. To provide cyber security , constant efforts are being made to secure the communications and to protect user data using various cryptography techniques. With the increasing number of cryptography, the number of keys used to secure communications also sees a high. It is always difficult to manage these keys and their identity in a multi process communication environment. This paper brings into light an approach for the enhancement of data security and cryptographic key management using a policy based key management system. An on the device approach is proposed which uses the file system to create a secure storage with enhanced security for the storage of the data . The access to this storage is governed by policies to allow an application based access to the storage. This model will provide a highly scalable secure storage and management of keys.


Author(s):  
S.E. Nyssanbayeva ◽  
◽  
N.A. Kapalova ◽  
A. Haumen

Cryptographic technologies that have become widespread in the world are inex- tricably linked to the issues of secure storage, use of keys, and key exchange. Often, insecure key management reduces the quality of even exceptionally good systems, since the security of the algorithm is concentrated mainly in the key. This paper proposes a key management model in cryptographic systems. The model is based on creating a unified key database for all users. This database is filled with keys of a certain length, which are generated using a pseudo-random sequence generation algorithm.


Author(s):  
Yassine Maleh ◽  
Abdelkbir Sahid ◽  
Abdellah Ezzati ◽  
Mustapha Belaissaoui

To deliver security services (integrity, confidentiality, authentication, availability), it is necessary that the communicating nodes share cryptographic keys for encryption and authentication. However, it is well known that the encryption systems represent the first line of defense against all types of attacks. Furthermore, cryptographic techniques must be designed to detect the execution of the most dangerous attacks. In addition, these techniques must be small to fit the limited resources of the WSN. The aims of this chapter are to discuss the mechanisms used to secure communications; to show their main adaptations required for adoption in smart sensors, which are described in the literature, particularly in terms of key management and distribution; and finally, to detail the different solutions proposed in the literature to secure the communication of smart and constrained sensor networks in the internet of things based on cryptography and intrusion detection systems.


Author(s):  
David Crowe ◽  
Wasim Al-Hamdani

This paper presents a synchronous encryption key management model that does not require the sender to disclose the encryption key in order to effect decryption. This eliminates the need for key exchange mechanisms, giving the sender improved control over their keys. The retained-key model is presented as being a software application that handles the initiation of a secure communication channel between sender and receiver, and facilitates user authentication by a trusted third party—presumably, the software’s vendor. This model is not intended to replace public/private key-based mechanisms, as they serve an important role in message signing and authentication. Rather, it seeks to provide an alternative means of decrypting messages in a secure fashion while allowing the sender to avoid the need to disclose the message’s key.


Sign in / Sign up

Export Citation Format

Share Document