blom's scheme
Recently Published Documents


TOTAL DOCUMENTS

4
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

2018 ◽  
Vol 7 (3.34) ◽  
pp. 241 ◽  
Author(s):  
Dr S. Chithra ◽  
Dr N. Bhalaji ◽  
S Nandini

The Internet of Things (IoT) refers to system in which smart objects interact with each other with the aid of sensors and actuators through wired/wireless connection. When an IoT concept is implemented for real life application, the possibility of the system being attacked increases. The security measures have to be improved to prevent the attacks.  This paper introduces light weight security schemes for authentication and encryption.  This system uses Blom’s scheme for authentication and Elliptic curve cryptography for encryption. Both these schemes are claimed to be light weight and hence is applicable of IoT applications which is a constrained environment.  These security schemes are applied for healthcare system. The system is proved to be strong against the security attacks. 


2016 ◽  
Vol 2016 (2) ◽  
pp. 167-174
Author(s):  
Михаил Рытов ◽  
Mikhail Rytov ◽  
Сергей Шпичак ◽  
Sergey Shpichak

The problems of access control to information and technological resources of automatic control systems for water supply companies are considered. The formalized model of the process of reliable access to information and technological resources is shown. The model takes into account the existence of a multitude of communication channels and a possibility of the organization of the operative cross access. A method to ensure a reliable access to information and technical resources of automatic control systems by water supply companies on the basis of the access policy combination, a scheme of deposit and a preliminary distribution of access authenticators. As a base example there was adopted Blom’s scheme. The method allows ensuring an operative cross access in case of emergency. To ensure an operative access in the method mentioned there was used a scheme of a complete division of a secret in the combination with authenticator evolution. As a basic example the evolution of authenticators based on Lamport’s protocol is considered.


Sign in / Sign up

Export Citation Format

Share Document