Redirigiendo al acceso original de articulo en 15 segundos...
ARTÍCULO
TITULO

Parameter analysis of Blom?s key distribution dynamic scheme

Seyed Pouria Zahraei    

Resumen

Matrix schemes of preliminary key distribution are considered in the paper, they are constructed on the basis of the Blom scheme. Such schemes are used, in particular, in wireless sensor networks and allow effectively changing secret key parameters of a trusted center (TC) when the keys of certain protocol participants are compromised.The paper presents a modernized Blom matrix scheme. It is assumed that the TC selects an N × N matrix P over a finite field GF (q), where N is the size of the network and q> N. Then, depending on the value of the security parameter t, the first t + 1 rows of the matrix P are taken as an open matrix. The matrix P is public, and it is assumed that any system of t + 1 columns to this matrix is linearly independent. In addition, it is assumed that the TC generates a random (t + 1) × (t + 1) symmetric secret matrix S over GF (q), 16S=X*XT , X is a random matrix of size (t + 1) × (t +1), and computes the matrix 16A=(S.P)T .If nodes i and j need to set a common key, they first exchange columns from the matrix P and then compute 16Kij  and 16Kji , respectively, using the secret rows of the matrix A.The probability of coincidence of keys for different pairs of participants is calculated.Based on the program implementation, the results of computational experiments are presented. In particular, the dependence of the probability of coincidence of the keys of two participants on the protocol parameters (the size of the field and the number of participants) was established experimentally. For q = 1009, the number of key matches for different N values was obtained. Also, the results for the value of N were obtained on the assumption that the maximum of coincidences should be equal to 5.

 Artículos similares

       
 
Lei Yang, Mengxue Xu and Yunan He    
Convolutional Neural Networks (CNNs) have become essential in deep learning applications, especially in computer vision, yet their complex internal mechanisms pose significant challenges to interpretability, crucial for ethical applications. Addressing t... ver más
Revista: Applied Sciences

 
Rui Zhou and Xianghong Xu    
The significant increase in the speed of high-speed trains has made the optimization of pantograph?catenary parameters aimed at improving current collection quality become one of the key issues that urgently need to be addressed. In this paper, a method ... ver más
Revista: Applied Sciences

 
Daniel Jancarczyk, Ireneusz Wróbel, Piotr Danielczyk and Marcin Sidzina    
Vibration monitoring is essential for maintaining the optimal performance and reliability of industrial machinery, which experiences dynamic forces and vibrations during operation. This study delved into a comprehensive analysis of vibration monitoring i... ver más
Revista: Applied Sciences

 
Tushar Ganguli and Edwin K. P. Chong    
We present a novel technique for pruning called activation-based pruning to effectively prune fully connected feedforward neural networks for multi-object classification. Our technique is based on the number of times each neuron is activated during model... ver más
Revista: Algorithms

 
José Luis Hernández-Martínez, Jorge Adrián Perera-Burgos, Gilberto Acosta-González, Jesús Alvarado-Flores, Yanmei Li and Rosa María Leal-Bautista    
Remote sensing is an invaluable research tool for the analysis of marine and terrestrial water bodies. However, it has some technical limitations in waters with oligotrophic conditions or close to them due to the low spectral response of some water param... ver más
Revista: Water