Explore chapters and articles related to this topic
Key Management
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
Key distribution is one of the major concerns of the key management system. In the key distribution scheme, the Key Distribution Center (KDC) is used which is responsible for securely distributing keys to the communicating entities. Symmetric keys can be distributed using symmetric encryption to the communicating entities, whereas the public keys can be distributed via a public announcement by using any public-key cryptographic algorithm, but the public announcement of public key can be forged by anyone and sometimes not desirable to use the public announcement method for distributing the keys. Public keys can also be distributed by using the public available directory maintained by a trusted organization. Each entity has its registered public keys with their names in the directory. This method also has vulnerabilities; if an intruder managed to get the private key of an entity, then it can get its public key from the available directory very easily. Public key authority and public key certificates are two other methods of distributing the keys to the communicating entities, in which an entity can get the public key via public key authority and public key certificates from the trusted organization, respectively. Both the methods of distributing the public keys have the vulnerabilities associated with it, which need to be addressed by the researchers. The above-mentioned distribution of private and public key method is discussed below in subsequent subsections.
Key Management and the Public-Key Revolution
Published in Jonathan Katz, Yehuda Lindell, Introduction to Modern Cryptography, 2020
Thus, KDCs can alleviate two of the problems we have seen with regard to private-key cryptography: they can simplify key distribution (since only one new key must be shared when an employee joins, and it is reasonable to assume a secure channel between the KDC and that employee on their first day of work), and can reduce the complexity of key storage (since each employee only needs to store a single key). KDCs go a long way toward making private-key cryptography practical in large organizations where there is a single entity who is trusted by everyone.
Security in Wireless Sensor Networks
Published in Yan Zhang, Jun Zheng, Honglin Hu, Security in Wireless Mesh Networks, 2008
Yong Wang, Garhan Attebury, Byrav Ramamurthy
In a centralized key scheme, there is only one entity, which is often called a key distribution center (KDC), controlling the generation, regeneration, and distribution of keys. The only proposed centralized key management scheme for WSNs in the current literature is the LKHW scheme, which is based on Logical Key Hierarchy (LKH) [62]. In this scheme, the base station is treated as a KDC and all keys are logically distributed in a tree rooted at the base station.
A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain
Published in Connection Science, 2022
Zeng Wu, Hui Huang, Yuping Zhou, Chenhuang Wu
Key Distribution Center (KDC): Responsible for assigning IDs to entities and managing the keys of the entities in the system.Cloud Service Provider (CSP): Provides services such as storage, access, and authorisation of IoT data. To save data storage costs, the CSP needs to delete duplicate data.Local Manager (LM): An edge computing platform deployed within large organisations. We define a large organisation as a domain. The LM is responsible for deleting duplicate data in the domain, delivering messages to member devices and CSPs as an intermediate layer, setting the label tree in the domain, and managing file sharing in the domain.Member Equipment (ME): An IoT device deployed by an organisation and managed by the LM. A ME uploads encrypted files to CSP via the LM. The ME needs to cooperate with the LM and CSP to deduplicate data and generate file tags.Personal Equipment (PE): An IoT device for individual users that does not belong to a large organisation. To store data in the CSP, a PE directly interacts with it and needs to cooperate with it for data deduplication.Blockchain: Records the specific processes of file uploading, file sharing and file downloading.