Key Management Scheme with Dynamic Coefficient Symmetric Polynomial

2022 ◽  
Author(s):  
Zhongya Liu ◽  
Yuan Teng
2013 ◽  
Vol 442 ◽  
pp. 501-506
Author(s):  
Bo Zhang ◽  
Yu Fei Wang ◽  
Tao Zhang ◽  
Yuan Yuan Ma

With the large-scale construction of smart grid, smart grid terminals widely using wireless access technology to communicate to the power systems. For ensuring the communication security, pair-wise key pre-distribution scheme is widely used, however, which introduces the complexity of key management, and insufficient security problems. According to the smart grid terminals wireless communication features, proposes an intelligent grid wireless terminal online key management scheme, which is based on the t rank binary symmetric polynomial and fully homomorphic encryption algorithm. This scheme make the communication key could be established with a few parameters between the communicating parties, which reduces the complexity of key predistribution and the amount of calculation. Moreover, the whole process of the key generation is encrypted by fully homomorphic encryption algorithm, effectively enhances the security of the scheme.


2013 ◽  
Vol 2 (2) ◽  
pp. 23-31
Author(s):  
Sufyan T. Faraj Al-janabi ◽  
Ali J. Dawood ◽  
Ekram H. Hassan

2010 ◽  
Vol 21 (3) ◽  
pp. 516-527 ◽  
Author(s):  
Ting YUAN ◽  
Jian-Qing MA ◽  
Yi-Ping ZHONG ◽  
Shi-Yong ZHANG

2009 ◽  
Vol 29 (3) ◽  
pp. 638-642
Author(s):  
Wei-ni ZENG ◽  
Ya-ping LIN ◽  
Qiu-ying LU

Author(s):  
Tong Chen ◽  
Lei Zhang ◽  
Kim-Kwang Raymond Choo ◽  
Rui Zhang ◽  
Xinyu Meng

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2962
Author(s):  
Xingda Chen ◽  
Margaret Lech ◽  
Liuping Wang

Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications. The latest LoRaWAN release v.1.1 has provided a security framework that includes data confidentiality protection, data integrity check, device authentication and key management. However, its key management part is only ambiguously defined. In this paper, a complete key management scheme is proposed for LoRaWAN. The scheme addresses key updating, key generation, key backup, and key backward compatibility. The proposed scheme was shown not only to enhance the current LoRaWAN standard, but also to meet the primary design consideration of LoRaWAN, i.e., low power consumption.


Author(s):  
Mohammed Y. Aldarwbi ◽  
Ali A. Ghorbani ◽  
Arash H. Lashkari

Sign in / Sign up

Export Citation Format

Share Document