Resilience Analysis of Key Update Strategies for Resource-Constrained Networks

Ender Yuksel, Hanne Riis Nielson, Flemming Nielson

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    Severe resource limitations in certain types of networks lead to various open issues in security. Since such networks usually operate in unattended or hostile environments, revoking the cryptographic keys and establishing (also distributing) new keys – which we refer to as key update – is a critical security issue. In this paper, we investigate the behaviour of different key update strategies under deviant network conditions. We consider resource-critical networks that employ symmetric cryptography and rely on (shared) network keys. We provide a methodology for quantitative security and performance analysis, and present a case study covering six different key update strategies.
    Original languageEnglish
    Title of host publication2011 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
    Publication date2011
    ISBN (Print)978-1-4577-0682-0
    Publication statusPublished - 2011
    Event3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops - Budapest, Hungary
    Duration: 5 Oct 20117 Oct 2011
    Conference number: 3

    Workshop

    Workshop3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops
    Number3
    Country/TerritoryHungary
    CityBudapest
    Period05/10/201107/10/2011
    SeriesInternational Conference on Ultra Modern Telecommunications & workshops
    ISSN2157-0221

    Cite this