Key Grids: A Protocol Family for Assigning Symmetric Keys

  title={Key Grids: A Protocol Family for Assigning Symmetric Keys},
  author={Amitanand S. Aiyer and Lorenzo Alvisi and Mohamed G. Gouda},
  journal={Proceedings of the 2006 IEEE International Conference on Network Protocols},
We describe a family of log n protocols for assigning symmetric keys to n processes in a network so that each process can use its assigned keys to communicate securely with every other process. The k-th protocol in our protocol family, where 1 les k les log n, assigns O(k2 kradicn) symmetric keys to each process in the network. (Thus, our (log n)-th protocol assigns O(log2 n) symmetric keys to each process. This is not far from the lower bound of O(log n) symmetric keys which we show is needed… CONTINUE READING
Highly Cited
This paper has 27 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 20 extracted citations

Protocol Family for Optimal and Deterministic Symmetric Key Assignment

Seventh International Conference on Networking (icn 2008) • 2008
View 7 Excerpts
Highly Influenced

Space-Efficient Keying in Wireless Communication Networks

Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007) • 2007
View 6 Excerpts
Highly Influenced

SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks

2010 Ninth International Symposium on Parallel and Distributed Computing • 2010
View 3 Excerpts
Highly Influenced

FKM: A Fingerprint-Based Key Management Protocol for SoC-Based Sensor Networks

2009 IEEE Wireless Communications and Networking Conference • 2009
View 6 Excerpts
Highly Influenced

TASK: Template-Based Key Assignment for Confidential Communication in Wireless Networks

2009 28th IEEE International Symposium on Reliable Distributed Systems • 2009
View 3 Excerpts
Highly Influenced

Symmetric Key Approaches to Securing BGP—A Little Bit Trust Is Enough

IEEE Transactions on Parallel and Distributed Systems • 2008
View 4 Excerpts
Highly Influenced

A template approach for group key distribution in dynamic ad-hoc groups

2017 IFIP Networking Conference (IFIP Networking) and Workshops • 2017
View 1 Excerpt


Publications referenced by this paper.
Showing 1-9 of 9 references

A family of collusion resistant protocols for instantiating security

S. S. Kulkarni, B. Bezawada
ICNP ’05: Proceedings of the 13TH IEEE International Conference on Network Protocols (ICNP’05). Washington, DC, USA: IEEE Computer Society, 2005, pp. 279–288. 186 • 2005
View 1 Excerpt

A key-management scheme for distributed sensor networks

ACM Conference on Computer and Communications Security • 2002
View 1 Excerpt

Providing probust and ubiqutious security support for mobile ad-hoc networks

J. Kong, P. Zefros, H. Luo, L. Zhang
IEEE International Conference on Network Protocols , 2001. • 2001
View 1 Excerpt

Design of Secure End-toEnd Protocols for Mobile Systems

IFIP World Conference on Mobile Communications • 1996
View 1 Excerpt

A matrix key-distribution scheme

Journal of Cryptology • 1990
View 2 Excerpts

Similar Papers

Loading similar papers…