Encryption and key management for the ECS satellite service
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
A Secure Audio Teleconference System
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Cluster-based Group Key Agreement for Wireless Ad hoc Networks
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Efficient cluster-based group key agreement protocols for wireless ad hoc networks
Journal of Network and Computer Applications
Group Key Management Scheme Based on Proxy Re-cryptography for Near-Space Network
NCIS '11 Proceedings of the 2011 International Conference on Network Computing and Information Security - Volume 01
Tree-based Multicast Key Management in ubiquitous computing environment
International Journal of Ad Hoc and Ubiquitous Computing
Cyber-Physical Challenges for Space Systems
ICCPS '12 Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems
A conference key distribution system
IEEE Transactions on Information Theory
Deep space communication--Past, present, and future
IEEE Communications Magazine
Dynamics of key management in secure satellite multicast
IEEE Journal on Selected Areas in Communications
Deep Space Telecommunications Systems Engineering
Deep Space Telecommunications Systems Engineering
High Performance Group Merging/Splitting Scheme for Group Key Management
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Key management is more difficult in space networks than in ground wireless networks as long time delay, large scale and difficult maintain. The main challenge is how to handle 1-affects-$$n$$ problem,which becomes more serious as space entities spread over a wide geographic area. To solve the question, this paper proposes a one-to-many mapping shared key agreement, which is based on one-to-many encryption mechanism model. In the proposed key agreement, each entity has different decryption key and shares an encryption key. When an entity joins or leaves network, updated keys only are a public encryption key and its decryption key. However, the other entities' secret key remains unchanged, so as to each member has the ability to update key autonomously and securely, legitimate member has capability of revoke it's secret decryption key independency without other member's agreement. Consequently the performance of the proposed key management scheme is unrelated to the network scale, node mobility and topology structure. It is shown that our proposed key management scheme not only improves the efficiency and flexibility for space networks, but also achieves good security properties, including forward security and backward security and many more by theoretical analyses.