Random Seed Generation For IoT Key Generation and Key Management System Using Blockchain

Author(s):  
Jungyong Choi ◽  
WoonSeob Shin ◽  
Jonghyun Kim ◽  
Ki-Hyung Kim
2014 ◽  
Vol 668-669 ◽  
pp. 783-786
Author(s):  
Rong Zeng ◽  
Xiu Li Huang ◽  
Ya Dong Chen

A design of encryption cards controlling multiple cipher chips’ high-rate parallel operation based on FPGA is proposed in this paper. According to the design method, we can achieve that multiple encryption card operates encryption in parallel way, which can improve the encryption and decryption rate of the encryption card without enhancing the performance of encryption chip, moreover, increase the key generation rate and management level of the key management system.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2962
Author(s):  
Xingda Chen ◽  
Margaret Lech ◽  
Liuping Wang

Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications. The latest LoRaWAN release v.1.1 has provided a security framework that includes data confidentiality protection, data integrity check, device authentication and key management. However, its key management part is only ambiguously defined. In this paper, a complete key management scheme is proposed for LoRaWAN. The scheme addresses key updating, key generation, key backup, and key backward compatibility. The proposed scheme was shown not only to enhance the current LoRaWAN standard, but also to meet the primary design consideration of LoRaWAN, i.e., low power consumption.


Author(s):  
Teay Shawyun

Most HEIs have piecemeal partially linked QMS (Quality Management System) or mechanisms to manage the data, statistics and documents heavy quality management of its academic aspirations disjointed from the planning dimension. The integrated eIQA structured in 9 e-modules are aimed at integrating the quality-information-planning trilogy into a paperless online real-time era of quality-information-planning management working in full tandem in conjunctions with each other holistically to support the key management and institution performance management and informed decision making. The linkages are establlished via the key reports, statistics, documents and action plans and projects required of quality management and accreditation across the QMS-PMS (Planning Management System) duo, as supported by a data warehouse and its applications data marts that interlinks the 9 e-modules in in eIQA.


Author(s):  
Kan Chen ◽  
Bala Natarajan

Over the last decade, physical layer secret key generation (PHY-SKG) techniques that exploit reciprocity of wireless channels have attracted considerable interest among researchers in the field of wireless communication. Compared to traditional cryptographic methods, PHY-SKG techniques offer the following advantages: a computationally bounded adversary does not need to be assumed; PHY-SKG avoids the requirement of key management, and secret keys can be dynamically replenished. Additionally, PHY-SKG can enhance existing security schemes because it operates independently of higher layer security schemes. However, a key drawback of PHY-SKG is low secret key generation rate (SKGR), a critical performance metric. Therefore, the role of advanced network technologies (e.g., multiple input multiple output (MIMO) and cooperative MIMO) must be explored to enhance SKGR. This paper describes how MIMO and cooperative MIMO techniques can enhance SKGR.


Sensors ◽  
2017 ◽  
Vol 17 (4) ◽  
pp. 670 ◽  
Author(s):  
Zahid Mahmood ◽  
Huansheng Ning ◽  
AtaUllah Ghafoor

Sign in / Sign up

Export Citation Format

Share Document