A General Scheme for the Pre-Distribution of Keys

Abstract

In this paper, we propose a generalized scheme for the predistribution of keys. Calculations are performed in an arbitrary vector space. Key materials are formed based on vector space elements and symmetric operator over a vector space. Two particular cases of application of the proposed scheme are considered.

This is a preview of subscription content, access via your institution.

REFERENCES

  1. 1

    Konoplev, A.G., Busygin, and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017–1021.

    Article  Google Scholar 

  2. 2

    Busygin, A., Konoplev, A., Kalinin, M., and Zegzhda, D., Floating genesis block enhancement for blockchain based routing between connected vehicles and software-defined VANET security services, SIN '18: Proceedings of the 11th International Conference on Security of Information and Networks, 2018. https://doi.org/10.1145/3264437.3264463

  3. 3

    Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 277–284.

  4. 4

    Shenets, N.N., Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 936–946.

    Article  Google Scholar 

  5. 5

    Shenets, N.N., Security infrastructure of FANET based on secret sharing and authenticated encryption, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 857–864.

    Article  Google Scholar 

  6. 6

    Aleksandrova, E.B., Shkorkina, E.N., and Kalinin, M.O., Organization of the quantum cryptographic keys distribution system for transportation infrastructure users, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 969–971.

    Article  Google Scholar 

  7. 7

    Aleksandrova, E.B., Yarmak, A.V., and Kalinin, M.O., Analysis of approaches to group authentication in large-scale industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 879–882.

    Article  Google Scholar 

  8. 8

    Aleksandrova, E.B., Shtyrkina, A.A., and Iarmak, A.V., Post-quantum primitives in information security, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 269–276.

  9. 9

    Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948–956.

    Article  Google Scholar 

  10. 10

    Zegzhda, P.D., Ivanov, D.V., Moskvin, D.A., and Kubrin, G.S., Actual security threats for vehicular and mobile ad hoc networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 993–999.

    Article  Google Scholar 

  11. 11

    Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, 2018 IEEE International Black Sea Conference on Communications and Networking, 2018. https://doi.org/10.1109/BlackSeaCom.2018.8433628

  12. 12

    Belenko, V., Chernenko, V., Krundyshev, V., and Kalinin, M., Data-driven failure analysis for the cyber physical infrastructures, 2019 IEEE International Conference on Industrial Cyber Physical Systems, 2019, pp. 775–779.

  13. 13

    Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, ACM International Conference Proceeding Series, 2018. https://doi.org/10.1145/3264437.3264479

  14. 14

    Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73–79.

  15. 15

    Blom, R., An optimal class of symmetric key generation systems, Advances in Cryptology, Workshop on the Theory and Application of of Cryptographic Techniques, Paris, 1984, pp. 335–338.

  16. 16

    Mitchell, C.J. and Piper, F.C., Key storage in secure networks, Discrete Appl. Math, 1988, vol. 21, no. 3, pp. 215–228.

    MathSciNet  MATH  Article  Google Scholar 

  17. 17

    Divya, R. and Thirumurugan, T.A., Novel dynamic key management scheme based on hamming distance for wireless sensor networks, Int. J. Sci. Eng. Res., 2011, vol. 2, no. 5, pp. 1–7.

    Google Scholar 

  18. 18

    Eschenauer, L. and Gligor, V.D., A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and Communication Security, 2002, pp. 41–47.

  19. 19

    Chan, H., Perrig, A., and Song, D., Random key pre-distribution schemes for sensor networks, Proceedings of IEEE Symposium on Security and Privacy, 2003, pp. 197–213.

  20. 20

    Belim, S.V. and Belim, S.Yu., KDP scheme of preliminary key distribution in discretionary security policy, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 773–776.

    Article  Google Scholar 

  21. 21

    Belim, S.V. and Belim, S.Yu., Use the keys pre-distribution KDP-scheme for mandatory access control implementation, J. Phys.: Conf. Ser., 2019, vol. 1210.

  22. 22

    Belim, S.V. and Belim, S.Yu., Mandatory access control implementation in the distributed systems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1124–1126.

    Article  Google Scholar 

  23. 23

    Belim, S.V. and Belim, S.Yu., The modification of Blom’s key predistribution scheme taken into account simplex channels, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1134–1137.

    Article  Google Scholar 

  24. 24

    Belim, S.V. and Belim, S.Yu., Implementation of simplex channels in the Blom’s keys pre-distribution scheme, J. Phys.: Conf. Ser., 2019, vol. 1210.

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to S. V. Belim.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by A. Ivanov

About this article

Verify currency and authenticity via CrossMark

Cite this article

Belim, S.V., Belim, S.Y. A General Scheme for the Pre-Distribution of Keys. Aut. Control Comp. Sci. 54, 860–863 (2020). https://doi.org/10.3103/S0146411620080088

Download citation

Keywords:

  • key predistribution scheme
  • vector space
  • symmetric encryption