Method and apparatus for key management in distributed...

Cryptography – Key management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S278000, C380S279000

Reexamination Certificate

active

07486795

ABSTRACT:
In a distributed sensor network, a method of key management is carried out in several phases, particularly key pre-distribution phase, shared key discovery phase, and as needed, a path key establishment phase. In the key pre-distribution phase, prior to DSN deployment, a ring of keys is distributed to each sensor node, each key ring consisting of randomly chosen keys from a large pool of keys which is generated off-line. A shared key exists between each two key rings with a predetermined probability. In the shared key discovery phase, which takes place upon deployment of the DSN, every sensor node discovers its neighbors in wireless communication range with which it shares keys, and the topology of the sensor array is established by forming secure communication links between respective sensor nodes. The path key establishment phase assigns a path key to selected pairs of sensor nodes in wireless communication range that do not share a key but are connected by two or more links at the end of the shared key discovery phase. The key management scheme also assumes a revocation phase for removal of the key ring of the compromised sensor node from the network. Also, re-keying phase is assumed for removal of those keys with the expired lifetime.

REFERENCES:
patent: 5455865 (1995-10-01), Perlman
patent: 5748736 (1998-05-01), Mittra
patent: 6240188 (2001-05-01), Dondeti et al.
patent: 6295361 (2001-09-01), Kadansky et al.
patent: 6373946 (2002-04-01), Johnston
patent: 6438550 (2002-08-01), Doyle et al.
patent: 6539093 (2003-03-01), Asad et al.
patent: 6584566 (2003-06-01), Hardjono
patent: 6650753 (2003-11-01), Lotspiech et al.
patent: 6694025 (2004-02-01), Epstein et al.
patent: 6748528 (2004-06-01), Greenfield
patent: 6788788 (2004-09-01), Kasahara et al.
patent: 6839436 (2005-01-01), Garay et al.
patent: 6941457 (2005-09-01), Gundavelli et al.
patent: 6993138 (2006-01-01), Hardjono
patent: 7020701 (2006-03-01), Gelvin et al.
patent: 7043024 (2006-05-01), Dinsmore et al.
patent: 7068789 (2006-06-01), Huitema et al.
patent: 7080255 (2006-07-01), Kasahara et al.
patent: 7120696 (2006-10-01), Au et al.
patent: 7234063 (2007-06-01), Baugher et al.
patent: 2002/0146127 (2002-10-01), Wong
patent: 2003/0002680 (2003-01-01), Akiyama et al.
patent: 2003/0021418 (2003-01-01), Arakawa et al.
patent: 2003/0044017 (2003-03-01), Briscoe
patent: 2003/0065941 (2003-04-01), Ballard et al.
patent: 2003/0081785 (2003-05-01), Boneh et al.
patent: 2003/0133576 (2003-07-01), Grumiaux
patent: 2004/0054891 (2004-03-01), Hengeveld et al.
“An Optimal Class of Symmetric key generation systems”—Rolf Blom 1998.
C. Blundo, A. DeSantis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, “Perfectly Secure Key Distribution for Dynamic Conferences,” in Advances in Cryptology—CRYPTO.
C. Blundo, L.A. Frota Mattos and D.R. Stinson, Tradeoffs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive K.
A. Fiat and M. Naor, “Broadcast Encryption,” in Advances in Cryptology—CRYPTO '93, LNCS 773, Springer-Verlag, Berlin, Aug. 1993, pp. 480-491.
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, K. Pister, “System architecture directions for network sensor,” Proc. Of ASPLOS-IX, Cambridge, Mass. 2000.
V.D. Gligor and P. Donescu, “Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes,” Fast Software Encryption 2001, M. Matsui (ed), LNCS 235.
C.S. Jutla, “Encryption Modes with Almost Free Message Integrity,” Advances in Cryptology—Eurocrypt 2001, B. Pfitzmann (ed.), LNCS 2045, Springer Verlag, May 2001.
J.M. Kahn, R.H. Katz and K.S.J. Pister, “Mobile Networking for Smart Dust,” ACM/IEEE Intl. Conf. on Mobile Computing and Networking (MobiCom 99), Seattle, WA, Aug. 17-.
P. Rogaway, M. Bellare, J. Black, and T. Krovetz, “OCB: A block-Cipher Mode of Operations for Efficient Authenticated Encryption,” Proc. of the 8th ACM Conf. on Computer.
S.R. White and L. Comerford, “ABYSS: An Architecture for Software Protection,” IEEE Transactions on Software Engineering, vol. 16, No. 6, Jun. 1990, pp. 619-629.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for key management in distributed... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for key management in distributed..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for key management in distributed... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4067710

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.