Architecture of multicast centralized key management scheme using quantum key distribution and classical symmetric encryption

2014 ◽  
Vol 223 (8) ◽  
pp. 1711-1728 ◽  
Author(s):  
A.F. Metwaly ◽  
M.Z. Rashad ◽  
F.A. Omara ◽  
A.A. Megahed
Author(s):  
Ahmed Farouk ◽  
Mohamed Elhoseny ◽  
Josep Batle ◽  
Mosayeb Naseri ◽  
Aboul Ella Hassanien

Most existing realizations of quantum key distribution (QKD) are point-to-point systems with one source transferring to only one destination. Growth of these single-receiver systems has now achieved a reasonably sophisticated point. However, many communication systems operate in a point-to-multi-point (Multicast) configuration rather than in point-to-point mode, so it is crucial to demonstrate compatibility with this type of network in order to maximize the application range for QKD. Therefore, this chapter proposed architecture for implementing a multicast quantum key distribution Schema. The proposed architecture is designed as a Multicast Centralized Key Management Scheme Using Quantum Key Distribution and Classical Symmetric Encryption. In this architecture, a secured key generation and distribution solution has been proposed for a single host sending to two or more (N) receivers using centralized Quantum Multicast Key Distribution Centre and classical symmetric encryption.


2019 ◽  
Vol 4 (6) ◽  
pp. 111-116
Author(s):  
Porkodi Chinniah ◽  
Sangavai Krishnamoorthi

Distributed Sensor Networks are broadly used in many applications and key distribution is a challenging task. In this work, a key management scheme is developed for distributed sensor networks based on elliptic curve cryptography over prime field. Key distribution among the nodes and interactive as well as non interactive protocols for agreement of common secret key for message transmission between two nodes are discussed. The probability for connectivity of the network generated according to the proposed key distribution scheme is discussed in detail. The implementation of the proposed scheme is done using NetSim interfaced with MATLAB. Connectivity of the network is also checked through eigenvalues of the Laplacian matrix of the network.   


2012 ◽  
Vol 5 (4) ◽  
pp. 130-141
Author(s):  
N. Sugandhi ◽  
S. Mirdula ◽  
D. Manivannan ◽  
R. Ranjini ◽  
D.H. Sharmili Minu

The purpose of this paper is to present an outlier detection mechanism for hierarchical key management which utilizes hybrid (public and private) key management scheme for implementing lightweight cryptographic primitives in hierarchical MANETs. Further, a comparative analysis of key management schemes is to be performed for identifying an efficient key management scheme for hierarchical MANETs. In key management methods, public and private group key management schemes are integrated at local level (subgroup) and global level (network). These key management schemes uses various topologies for minimizing communicational and computational costs. After implementing an efficient key management scheme, outliers in network are identified using packet analysis at key generation, key distribution, message transmission and key re-generation phases. It is observed that Teo and Tan key management approach with shamir’s threshold key distribution mechanism is an efficient approach key management scheme for group authentication and hierarchical key management. Further, a minimum improvement of 9.7% and 0.91%, and maximum improvements of 25.3% and 87.7% are observed for Packet Delivery Rate (APDR) and Average Throughput (AT) respectively in a network of 1000 nodes. The proposed method requires four sequential analysis of outlier detection schemes at different layers of MANET protocol stack because single scheme per layer is not efficient in identifying outliers in proposed network. The proposed key management method is useful for MANETs in group authentication and implementation of lightweight cryptographic primitives with secure key. Further, outlier detection mechanism can be extended for identifying various active and passive attacks.


2020 ◽  
Author(s):  
Ziwen Liu ◽  
Jian Zhou ◽  
Lifan Ma

Abstract Aiming at the difficulty of key distribution and identity authentication in the opportunistic network, this paper proposes a self-organized public key management scheme. This solution solves the problem of nodes in the opportunistic network through distributed storage of public keys and public key strengthening mechanisms. The problem of difficult key distribution caused by poor connectivity. Simulation experiments show that the scheme can effectively guarantee secure communication and has good anti-attack ability.


2013 ◽  
Vol 2 (2) ◽  
pp. 23-31
Author(s):  
Sufyan T. Faraj Al-janabi ◽  
Ali J. Dawood ◽  
Ekram H. Hassan

2010 ◽  
Vol 21 (3) ◽  
pp. 516-527 ◽  
Author(s):  
Ting YUAN ◽  
Jian-Qing MA ◽  
Yi-Ping ZHONG ◽  
Shi-Yong ZHANG

Sign in / Sign up

Export Citation Format

Share Document