Key Grids: A Protocol Family for Assigning Symmetric Keys
We describe a family of log n protocols for assigning symmetric keys to n processes in a network so that each process can use its assigned keys to communicate securely with every other process. The k-th protocol in our protocol family, where 1 les k les log n, assigns O(k 2 k radicn) symmetric keys...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 186 |
---|---|
container_issue | |
container_start_page | 178 |
container_title | |
container_volume | |
creator | Aiyer, A.S. Alvisi, L. Gouda, M.G. |
description | We describe a family of log n protocols for assigning symmetric keys to n processes in a network so that each process can use its assigned keys to communicate securely with every other process. The k-th protocol in our protocol family, where 1 les k les log n, assigns O(k 2 k radicn) symmetric keys to each process in the network. (Thus, our (log n)-th protocol assigns O(log 2 n) symmetric keys to each process. This is not far from the lower bound of O(log n) symmetric keys which we show is needed for each process to communicate securely with every other process in the network.) The protocols in our protocol family can be used to assign symmetric keys to the processes in a sensor network, or ad-hoc or mobile network, where each process has a small memory to store its assigned keys. We also discuss the vulnerability of our protocols to "collusion". In particular, we show that k radicn colluding processes can compromise the security of the k-th protocol in our protocol family. |
doi_str_mv | 10.1109/ICNP.2006.320211 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4110290</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4110290</ieee_id><sourcerecordid>4110290</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-6f5baa7c684d2eb7368cac16158d0d897cd7c9a7c764c20c86de6b526027a8d3</originalsourceid><addsrcrecordid>eNpFkEtLxDAcxOML7K7eBS_5Aq3_PJqHt7K46-KiC-t9SZN0ibRbSXrptzeg4GkOM79hGIQeCFSEgH7art73FQUQFaNACblAC8Ip51BrLi9RQQVnJWPArv4Npq9RkWFaEsHVLVqk9AWQcckKpN_8jDcxuPSMG7yP4zTascdrM4R-xt0YcZNSOJ3D-YQP8zD4KQaLM5Tu0E1n-uTv_3SJDuuXz9VrufvYbFfNrgwaplJ0dWuMtEJxR30rmVDWWCJIrRw4paV10uockIJbClYJ50VbU5HnGeXYEj3-tgbv_fE7hsHE-cjzGVQD-wG9VUi6</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Key Grids: A Protocol Family for Assigning Symmetric Keys</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Aiyer, A.S. ; Alvisi, L. ; Gouda, M.G.</creator><creatorcontrib>Aiyer, A.S. ; Alvisi, L. ; Gouda, M.G.</creatorcontrib><description>We describe a family of log n protocols for assigning symmetric keys to n processes in a network so that each process can use its assigned keys to communicate securely with every other process. The k-th protocol in our protocol family, where 1 les k les log n, assigns O(k 2 k radicn) symmetric keys to each process in the network. (Thus, our (log n)-th protocol assigns O(log 2 n) symmetric keys to each process. This is not far from the lower bound of O(log n) symmetric keys which we show is needed for each process to communicate securely with every other process in the network.) The protocols in our protocol family can be used to assign symmetric keys to the processes in a sensor network, or ad-hoc or mobile network, where each process has a small memory to store its assigned keys. We also discuss the vulnerability of our protocols to "collusion". In particular, we show that k radicn colluding processes can compromise the security of the k-th protocol in our protocol family.</description><identifier>ISSN: 1092-1648</identifier><identifier>ISBN: 1424405939</identifier><identifier>ISBN: 9781424405930</identifier><identifier>EISSN: 2643-3303</identifier><identifier>EISBN: 1424405947</identifier><identifier>EISBN: 9781424405947</identifier><identifier>DOI: 10.1109/ICNP.2006.320211</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; Mobile communication ; Protocols</subject><ispartof>Proceedings of the 2006 IEEE International Conference on Network Protocols, 2006, p.178-186</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4110290$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4110290$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Aiyer, A.S.</creatorcontrib><creatorcontrib>Alvisi, L.</creatorcontrib><creatorcontrib>Gouda, M.G.</creatorcontrib><title>Key Grids: A Protocol Family for Assigning Symmetric Keys</title><title>Proceedings of the 2006 IEEE International Conference on Network Protocols</title><addtitle>ICNP</addtitle><description>We describe a family of log n protocols for assigning symmetric keys to n processes in a network so that each process can use its assigned keys to communicate securely with every other process. The k-th protocol in our protocol family, where 1 les k les log n, assigns O(k 2 k radicn) symmetric keys to each process in the network. (Thus, our (log n)-th protocol assigns O(log 2 n) symmetric keys to each process. This is not far from the lower bound of O(log n) symmetric keys which we show is needed for each process to communicate securely with every other process in the network.) The protocols in our protocol family can be used to assign symmetric keys to the processes in a sensor network, or ad-hoc or mobile network, where each process has a small memory to store its assigned keys. We also discuss the vulnerability of our protocols to "collusion". In particular, we show that k radicn colluding processes can compromise the security of the k-th protocol in our protocol family.</description><subject>Ad hoc networks</subject><subject>Mobile communication</subject><subject>Protocols</subject><issn>1092-1648</issn><issn>2643-3303</issn><isbn>1424405939</isbn><isbn>9781424405930</isbn><isbn>1424405947</isbn><isbn>9781424405947</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFkEtLxDAcxOML7K7eBS_5Aq3_PJqHt7K46-KiC-t9SZN0ibRbSXrptzeg4GkOM79hGIQeCFSEgH7art73FQUQFaNACblAC8Ip51BrLi9RQQVnJWPArv4Npq9RkWFaEsHVLVqk9AWQcckKpN_8jDcxuPSMG7yP4zTascdrM4R-xt0YcZNSOJ3D-YQP8zD4KQaLM5Tu0E1n-uTv_3SJDuuXz9VrufvYbFfNrgwaplJ0dWuMtEJxR30rmVDWWCJIrRw4paV10uockIJbClYJ50VbU5HnGeXYEj3-tgbv_fE7hsHE-cjzGVQD-wG9VUi6</recordid><startdate>200611</startdate><enddate>200611</enddate><creator>Aiyer, A.S.</creator><creator>Alvisi, L.</creator><creator>Gouda, M.G.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200611</creationdate><title>Key Grids: A Protocol Family for Assigning Symmetric Keys</title><author>Aiyer, A.S. ; Alvisi, L. ; Gouda, M.G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-6f5baa7c684d2eb7368cac16158d0d897cd7c9a7c764c20c86de6b526027a8d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Ad hoc networks</topic><topic>Mobile communication</topic><topic>Protocols</topic><toplevel>online_resources</toplevel><creatorcontrib>Aiyer, A.S.</creatorcontrib><creatorcontrib>Alvisi, L.</creatorcontrib><creatorcontrib>Gouda, M.G.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Aiyer, A.S.</au><au>Alvisi, L.</au><au>Gouda, M.G.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Key Grids: A Protocol Family for Assigning Symmetric Keys</atitle><btitle>Proceedings of the 2006 IEEE International Conference on Network Protocols</btitle><stitle>ICNP</stitle><date>2006-11</date><risdate>2006</risdate><spage>178</spage><epage>186</epage><pages>178-186</pages><issn>1092-1648</issn><eissn>2643-3303</eissn><isbn>1424405939</isbn><isbn>9781424405930</isbn><eisbn>1424405947</eisbn><eisbn>9781424405947</eisbn><abstract>We describe a family of log n protocols for assigning symmetric keys to n processes in a network so that each process can use its assigned keys to communicate securely with every other process. The k-th protocol in our protocol family, where 1 les k les log n, assigns O(k 2 k radicn) symmetric keys to each process in the network. (Thus, our (log n)-th protocol assigns O(log 2 n) symmetric keys to each process. This is not far from the lower bound of O(log n) symmetric keys which we show is needed for each process to communicate securely with every other process in the network.) The protocols in our protocol family can be used to assign symmetric keys to the processes in a sensor network, or ad-hoc or mobile network, where each process has a small memory to store its assigned keys. We also discuss the vulnerability of our protocols to "collusion". In particular, we show that k radicn colluding processes can compromise the security of the k-th protocol in our protocol family.</abstract><pub>IEEE</pub><doi>10.1109/ICNP.2006.320211</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1092-1648 |
ispartof | Proceedings of the 2006 IEEE International Conference on Network Protocols, 2006, p.178-186 |
issn | 1092-1648 2643-3303 |
language | eng |
recordid | cdi_ieee_primary_4110290 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Ad hoc networks Mobile communication Protocols |
title | Key Grids: A Protocol Family for Assigning Symmetric Keys |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-20T03%3A03%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Key%20Grids:%20A%20Protocol%20Family%20for%20Assigning%20Symmetric%20Keys&rft.btitle=Proceedings%20of%20the%202006%20IEEE%20International%20Conference%20on%20Network%20Protocols&rft.au=Aiyer,%20A.S.&rft.date=2006-11&rft.spage=178&rft.epage=186&rft.pages=178-186&rft.issn=1092-1648&rft.eissn=2643-3303&rft.isbn=1424405939&rft.isbn_list=9781424405930&rft_id=info:doi/10.1109/ICNP.2006.320211&rft_dat=%3Cieee_6IE%3E4110290%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424405947&rft.eisbn_list=9781424405947&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4110290&rfr_iscdi=true |