DocumentCode :
556225
Title :
Resilience analysis of key update strategies for resource-constrained networks
Author :
Yüksel, Ender ; Nielson, Hanne Riis ; Nielson, Flemming
Author_Institution :
Dept. of Inf., Tech. Univ. of Denmark, Lyngby, Denmark
fYear :
2011
fDate :
5-7 Oct. 2011
Firstpage :
1
Lastpage :
8
Abstract :
Severe resource limitations in certain types of networks lead to various open issues in security. Since such networks usually operate in unattended or hostile environments, revoking the cryptographic keys and establishing (also distributing) new keys - which we refer to as key update - is a critical security issue. In this paper, we investigate the behaviour of different key update strategies under deviant network conditions. We consider resource-critical networks that employ symmetric cryptography and rely on (shared) network keys. We provide a methodology for quantitative security and performance analysis, and present a case study covering six different key update strategies.
Keywords :
cryptography; telecommunication security; cryptographic keys; deviant network conditions; key update strategies; resilience analysis; resource-constrained networks; resource-critical networks; symmetric cryptography; Analytical models; Performance evaluation; Radiation detectors; Reliability; Security; Stochastic processes; Transient analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2011 3rd International Congress on
Conference_Location :
Budapest
ISSN :
2157-0221
Print_ISBN :
978-1-4577-0682-0
Type :
conf
Filename :
6078929
Link To Document :
بازگشت