In this paper, we propose a generalized scheme for the predistribution of keys. Calculations are performed in an arbitrary vector space. Key materials are formed based on vector space elements and symmetric operator over a vector space. Two particular cases of application of the proposed scheme are considered.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Konoplev, A.G., Busygin, and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017–1021.
Busygin, A., Konoplev, A., Kalinin, M., and Zegzhda, D., Floating genesis block enhancement for blockchain based routing between connected vehicles and software-defined VANET security services, SIN '18: Proceedings of the 11th International Conference on Security of Information and Networks, 2018. https://doi.org/10.1145/3264437.3264463
Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 277–284.
Shenets, N.N., Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 936–946.
Shenets, N.N., Security infrastructure of FANET based on secret sharing and authenticated encryption, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 857–864.
Aleksandrova, E.B., Shkorkina, E.N., and Kalinin, M.O., Organization of the quantum cryptographic keys distribution system for transportation infrastructure users, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 969–971.
Aleksandrova, E.B., Yarmak, A.V., and Kalinin, M.O., Analysis of approaches to group authentication in large-scale industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 879–882.
Aleksandrova, E.B., Shtyrkina, A.A., and Iarmak, A.V., Post-quantum primitives in information security, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 269–276.
Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948–956.
Zegzhda, P.D., Ivanov, D.V., Moskvin, D.A., and Kubrin, G.S., Actual security threats for vehicular and mobile ad hoc networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 993–999.
Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, 2018 IEEE International Black Sea Conference on Communications and Networking, 2018. https://doi.org/10.1109/BlackSeaCom.2018.8433628
Belenko, V., Chernenko, V., Krundyshev, V., and Kalinin, M., Data-driven failure analysis for the cyber physical infrastructures, 2019 IEEE International Conference on Industrial Cyber Physical Systems, 2019, pp. 775–779.
Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, ACM International Conference Proceeding Series, 2018. https://doi.org/10.1145/3264437.3264479
Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73–79.
Blom, R., An optimal class of symmetric key generation systems, Advances in Cryptology, Workshop on the Theory and Application of of Cryptographic Techniques, Paris, 1984, pp. 335–338.
Mitchell, C.J. and Piper, F.C., Key storage in secure networks, Discrete Appl. Math, 1988, vol. 21, no. 3, pp. 215–228.
Divya, R. and Thirumurugan, T.A., Novel dynamic key management scheme based on hamming distance for wireless sensor networks, Int. J. Sci. Eng. Res., 2011, vol. 2, no. 5, pp. 1–7.
Eschenauer, L. and Gligor, V.D., A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and Communication Security, 2002, pp. 41–47.
Chan, H., Perrig, A., and Song, D., Random key pre-distribution schemes for sensor networks, Proceedings of IEEE Symposium on Security and Privacy, 2003, pp. 197–213.
Belim, S.V. and Belim, S.Yu., KDP scheme of preliminary key distribution in discretionary security policy, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 773–776.
Belim, S.V. and Belim, S.Yu., Use the keys pre-distribution KDP-scheme for mandatory access control implementation, J. Phys.: Conf. Ser., 2019, vol. 1210.
Belim, S.V. and Belim, S.Yu., Mandatory access control implementation in the distributed systems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1124–1126.
Belim, S.V. and Belim, S.Yu., The modification of Blom’s key predistribution scheme taken into account simplex channels, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1134–1137.
Belim, S.V. and Belim, S.Yu., Implementation of simplex channels in the Blom’s keys pre-distribution scheme, J. Phys.: Conf. Ser., 2019, vol. 1210.
The authors declare that they have no conflicts of interest.
Translated by A. Ivanov
About this article
Cite this article
Belim, S.V., Belim, S.Y. A General Scheme for the Pre-Distribution of Keys. Aut. Control Comp. Sci. 54, 860–863 (2020). https://doi.org/10.3103/S0146411620080088
- key predistribution scheme
- vector space
- symmetric encryption