Secured Key Distribution Scheme for Cryptographic Key Management System

Kyawt Kyawt Khaing ◽  
Khin Mi Mi Aung
2018 ◽  
Vol 7 (3.34) ◽  
pp. 554
Seung Hwan Ju ◽  
Hee Suk Seo

Background/Objectives: Security features are an essential part of recent smart metering systems. Smart meters are considered an important facility that must be protected by applying the latest security technologies.Methods/Statistical analysis: Security context determines the rules for applying/verifying security. DLMS/COSEM have Security suite to set of cryptographic algorithms. This is based on symmetric key based cryptographic communication. The high level security requires public key based cryptographic communication and digital signature.The security specification references the key scheme of DLMS-COSEM, which is based on a single set of unique symmetric keys per meter.Findings: we have studied a sequence for distributing security keys required by DLMS / COSEM.Our smart metering key distribution system can provide a security key management system such as key generation / distribution between AMI components. This is a PKI-based authentication using public key method (ECC), and a DLMS standard key distribution method after generating a session key using a public key. This system can also provide a key management scheme between DLMS clients not defined in the DLMS standard.Improvements/Applications: we analyze security requirements of DLMS/COSEM for secure smart metering and design key distribution/management method.  

The availability and use of cheaper and smaller sensors has brought an evolution in the field of Wireless Sensor Networks. The changes occurring in the environment can be observed, recorded through the large-scale deployment of sensor nodes that can build-up the much-required information system. Also, they are able to monitor and congregate data about the living organisms therein. In near future, millions more devices are expected to be connected. We focus upon the security services required by WSNs that are most challenging as compared to other networks. First, we introduce the commercially used motes with the comparison of technical and implementation related issues. Second, we analysed the variants of existing one-pass key management protocols for the resource constrained devices. Our aim is to provide a new direction to WSN Security through a restricted key distribution mechanism.

Cyber Security, over the last few years, has been a topic of great research given the number of cyber crimes have been increasing. To provide cyber security , constant efforts are being made to secure the communications and to protect user data using various cryptography techniques. With the increasing number of cryptography, the number of keys used to secure communications also sees a high. It is always difficult to manage these keys and their identity in a multi process communication environment. This paper brings into light an approach for the enhancement of data security and cryptographic key management using a policy based key management system. An on the device approach is proposed which uses the file system to create a secure storage with enhanced security for the storage of the data . The access to this storage is governed by policies to allow an application based access to the storage. This model will provide a highly scalable secure storage and management of keys.

Martin Rublík

Cryptographic key distribution and management is one of the most important steps in the process of securing data by utilizing encryption. Problems related to cryptographic key distribution and management are hard to solve and easy to exploit, and therefore, they are appealing to the attacker. The purpose of this chapter is to introduce the topics of cryptographic key distribution and management, especially with regards to asymmetric keys. The chapter describes how these topics are handled today, what the real-world problems related to cryptographic key distribution and management are, and presents existing solutions as well as future directions in their solving. The authors present the cryptographic key management and distribution problems from a multidisciplinary point of view by looking at its economic, psychological, usability, and technological aspects.

Photonics ◽  
2021 ◽  
Vol 8 (6) ◽  
pp. 208
Xiangqing Wang ◽  
Jie Zhang ◽  
Bo Wang ◽  
Kongni Zhu ◽  
Haokun Song ◽  

With the increase in the popularity of cloud computing and big data applications, the amount of sensitive data transmitted through optical networks has increased dramatically. Furthermore, optical transmission systems face various security risks at the physical level. We propose a novel key distribution scheme based on signal-to-noise ratio (SNR) measurements to extract the fingerprint of the fiber channel and improve the physical level of security. The SNR varies with time because the fiber channel is affected by many physical characteristics, such as dispersion, polarization, scattering, and amplifier noise. The extracted SNR of the optical fiber channel can be used as the basis of key generation. Alice and Bob can obtain channel characteristics by measuring the SNR of the optical fiber channel and generate the consistent key by quantization coding. The security and consistency of the key are guaranteed by the randomness and reciprocity of the channel. The simulation results show that the key generation rate (KGR) can reach 25 kbps, the key consistency rate (KCR) can reach 98% after key post-processing, and the error probability of Eve’s key is ~50%. In the proposed scheme, the equipment used is simple and compatible with existing optic fiber links.

Sign in / Sign up

Export Citation Format

Share Document