The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen...The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.展开更多
The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive...The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive power consumption,which constitute a danger to intelligent IoT-based apps.Group managing is primarily used for transmitting and multi-pathing communications that are secured with a general group key and it can only be decrypted by an authorized group member.A centralized trustworthy system,which is in charge of key distribution and upgrades,is used to maintain group keys.To provide longitudinal access controls,Software Defined Network(SDN)based security controllers are employed for group administration services.Cloud service providers provide a variety of security features.There are just a few software security answers available.In the proposed system,a hybrid protocols were used in SDN and it embeds edge system to improve the security in the group communication.Tree-based algorithms compared with Group Key Establishment(GKE)and Multivariate public key cryptosystem with Broadcast Encryption in the proposed system.When all factors are considered,Broadcast Encryption(BE)appears to become the most logical solution to the issue.BE enables an initiator to send encrypted messages to a large set of recipients in a efficient and productive way,meanwhile assuring that the data can only be decrypted by defining characteristic.The proposed method improves the security,efficiency of the system and reduces the power consumption and minimizes the cost.展开更多
Wireless sensor networks are being deployed for some practical applications and their se-curity has received considerable attention.It is an important challenge to find out suitable keyagreement and encryption scheme ...Wireless sensor networks are being deployed for some practical applications and their se-curity has received considerable attention.It is an important challenge to find out suitable keyagreement and encryption scheme for wireless sensor networks due to limitations of the power,com-putation capability and storage resources.In this paper,an efficient key agreement and encryptionscheme for wireless sensor networks is presented.Results of analysis and simulations among the pro-posed scheme and other schemes show that the proposed scheme has some advantages in terms ofenergy consumption,computation requirement,storage requirement and security.展开更多
Underwater acoustic networks (UANs) adopt acoustic communication. The opening and sharing features of underwater acoustic channel make communication in UANs vulnerable to eavesdropping and interfering. The application...Underwater acoustic networks (UANs) adopt acoustic communication. The opening and sharing features of underwater acoustic channel make communication in UANs vulnerable to eavesdropping and interfering. The applications of UANs such as underwater military, underwater warning and energy development are very demanding for the security level. Quantum computing poses a threat to security of the traditional public key cryptosystem such as large integer factorization and discrete logarithm. To solve these problems, a public key encryption algorithm is proposed based on number theory research unit (NTRU) for underwater acoustic networks. The traditional NTRU encryption scheme was improved and a new public key cryptosystem was provided. The algorithm combined the encryption algorithm with the identity of the node. Experimental results show that the key generation speed is very fast, and the speed of encryption and decryption is faster than RSA, ECC, ElGamal and other public key cryptosystems. It verifies that the encryption algorithm can resist quantum computing attacks.展开更多
The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and managemen...The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and management levels, and this expansion should be achieved smoothly from the original system. The upward, downward, and horizontal expansions of PKI are discussed in this paper. A path discovery method is suggested to reduce the effect of PKI expansion to the end entities, so as to enhance the availbility of PKI services.展开更多
安全、高效的信息通信技术对主动配电网(Active Distribution Network,ADN)的可靠运行具有重要作用,然而大量分布式能源的接入和无线公网通信技术的使用,使得ADN较传统配电网面临着更加严峻的信息安全威胁。文章将我国具有自主知识产权...安全、高效的信息通信技术对主动配电网(Active Distribution Network,ADN)的可靠运行具有重要作用,然而大量分布式能源的接入和无线公网通信技术的使用,使得ADN较传统配电网面临着更加严峻的信息安全威胁。文章将我国具有自主知识产权的SM系列国密算法推广到ADN中,设计了适用于ADN的安全通信协议,其中,基于对称密钥的广播协议开创性地通过差值密钥计算,解决了基层设备计算能力差、实时性要求高、广播认证难的问题;而基于非对称密钥的安全通信协议则通过预认证防止了拒绝服务(Denial of Service,DOS)攻击,并采用SM2椭圆曲线算法提高了其安全性。结合ADN实际通信流程编写了计算程序并做了简单测试,最后对协议的安全性能进行了分析。展开更多
基金Project(61100201) supported by National Natural Science Foundation of ChinaProject(12ZZ019) supported by Technology Innovation Research Program,Shang Municipal Education Commission,China+1 种基金Project(LYM11053) supported by the Foundation for Distinguished Young Talents in Higher Education of Guangdong Province,ChinaProject(NCET-12-0358) supported by New Century Excellent Talentsin University,Ministry of Education,China
文摘The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.
文摘The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive power consumption,which constitute a danger to intelligent IoT-based apps.Group managing is primarily used for transmitting and multi-pathing communications that are secured with a general group key and it can only be decrypted by an authorized group member.A centralized trustworthy system,which is in charge of key distribution and upgrades,is used to maintain group keys.To provide longitudinal access controls,Software Defined Network(SDN)based security controllers are employed for group administration services.Cloud service providers provide a variety of security features.There are just a few software security answers available.In the proposed system,a hybrid protocols were used in SDN and it embeds edge system to improve the security in the group communication.Tree-based algorithms compared with Group Key Establishment(GKE)and Multivariate public key cryptosystem with Broadcast Encryption in the proposed system.When all factors are considered,Broadcast Encryption(BE)appears to become the most logical solution to the issue.BE enables an initiator to send encrypted messages to a large set of recipients in a efficient and productive way,meanwhile assuring that the data can only be decrypted by defining characteristic.The proposed method improves the security,efficiency of the system and reduces the power consumption and minimizes the cost.
基金the Six Great Talent Peak Plan of JiangsuProvince(No 06-E-044)the"Qinlan Project"plan of Jiangsu province 2006 and the Natural Science Founda-tion of Jiangsu Province(No.BK2004218).
文摘Wireless sensor networks are being deployed for some practical applications and their se-curity has received considerable attention.It is an important challenge to find out suitable keyagreement and encryption scheme for wireless sensor networks due to limitations of the power,com-putation capability and storage resources.In this paper,an efficient key agreement and encryptionscheme for wireless sensor networks is presented.Results of analysis and simulations among the pro-posed scheme and other schemes show that the proposed scheme has some advantages in terms ofenergy consumption,computation requirement,storage requirement and security.
基金Key lab of IoT of Qinghai (No. 2017-ZJ-Y21)the National Social Science Foundation of China (No. 18XMZ050, No. 15XMZ057)+1 种基金the National Science Foundation of China (No. 61751111)Qinghai Office of Science and Technology (No. 2019-ZJ-7086, No. 2018-SF-143, No. 2015-ZJ-718).
文摘Underwater acoustic networks (UANs) adopt acoustic communication. The opening and sharing features of underwater acoustic channel make communication in UANs vulnerable to eavesdropping and interfering. The applications of UANs such as underwater military, underwater warning and energy development are very demanding for the security level. Quantum computing poses a threat to security of the traditional public key cryptosystem such as large integer factorization and discrete logarithm. To solve these problems, a public key encryption algorithm is proposed based on number theory research unit (NTRU) for underwater acoustic networks. The traditional NTRU encryption scheme was improved and a new public key cryptosystem was provided. The algorithm combined the encryption algorithm with the identity of the node. Experimental results show that the key generation speed is very fast, and the speed of encryption and decryption is faster than RSA, ECC, ElGamal and other public key cryptosystems. It verifies that the encryption algorithm can resist quantum computing attacks.
文摘The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and management levels, and this expansion should be achieved smoothly from the original system. The upward, downward, and horizontal expansions of PKI are discussed in this paper. A path discovery method is suggested to reduce the effect of PKI expansion to the end entities, so as to enhance the availbility of PKI services.
文摘安全、高效的信息通信技术对主动配电网(Active Distribution Network,ADN)的可靠运行具有重要作用,然而大量分布式能源的接入和无线公网通信技术的使用,使得ADN较传统配电网面临着更加严峻的信息安全威胁。文章将我国具有自主知识产权的SM系列国密算法推广到ADN中,设计了适用于ADN的安全通信协议,其中,基于对称密钥的广播协议开创性地通过差值密钥计算,解决了基层设备计算能力差、实时性要求高、广播认证难的问题;而基于非对称密钥的安全通信协议则通过预认证防止了拒绝服务(Denial of Service,DOS)攻击,并采用SM2椭圆曲线算法提高了其安全性。结合ADN实际通信流程编写了计算程序并做了简单测试,最后对协议的安全性能进行了分析。