iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/DAC.4841
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T20:35:54Z","timestamp":1719088554466},"reference-count":29,"publisher":"Wiley","issue":"11","license":[{"start":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T00:00:00Z","timestamp":1620086400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2019MF054"],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012558","name":"Foundation of Science and Technology on Information Assurance Laboratory","doi-asserted-by":"publisher","award":["KJ\u201017\u2010004"],"id":[{"id":"10.13039\/501100012558","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902091"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2021,7,25]]},"abstract":"Summary<\/jats:title>The data link protocols proposed by the Consultative Committee for Space Data Systems (CCSDS) is widely used in space missions. However, the current space key management schemes are inefficient in scalability, security, and key update. In this work, a threshold\u2010based spatial key management scheme is proposed and applied to the CCSDS telecommunication control (TC) protocol to ensure the security of spatial networks. The threshold\u2010based key management algorithm using LDPC code is designed to generate, distribute, update, and deactivate the master key. The bilinear pairing cryptosystem is used to protect the group key and provide authentication. The security and performance of the proposed scheme are analyzed. Furthermore, the network model, node model, and process model of CCSDS\u2010TC protocol based on the proposed scheme are constructed and simulated on OPNET platform. The result shows that the storage overhead of the proposed scheme is lower than the improved Shamir and ECC\u2010based key management schemes. Its computational overhead is approximately changeless, whereas the network scale is increasing. Furthermore, the proposed scheme only uses binary multiplication, which takes lower computation overhead. Therefore, the proposed scheme has higher security, scalability, and low resource consumption.<\/jats:p>","DOI":"10.1002\/dac.4841","type":"journal-article","created":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:59:02Z","timestamp":1620133142000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Threshold\u2010based key management scheme for space network"],"prefix":"10.1002","volume":"34","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1543-9433","authenticated-orcid":false,"given":"Xiaojun","family":"Tong","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology Harbin Institute of Technology Weihai China"}]},{"given":"Jie","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software Northwestern Polytechnical University Xi'an China"}]},{"given":"Zhu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Harbin Institute of Technology Weihai China"}]},{"given":"Miao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Harbin Institute of Technology Weihai China"}]},{"given":"Jing","family":"Ma","sequence":"additional","affiliation":[{"name":"Science and Technology on Information Assurance Laboratory Beijing China"}]}],"member":"311","published-online":{"date-parts":[[2021,5,4]]},"reference":[{"key":"e_1_2_9_2_1","unstructured":"CCSDS.CCSDS 232.0\u2010B\u20103 TC space data link protocol. Washington DC USA: CCSDS Secretariat National Aeronautics and Space Administration 2015."},{"key":"e_1_2_9_3_1","unstructured":"CCSDS.CCSDS 355.0\u2010B\u20101 space data link security protocol. Washington DC USA: CCSDS Secretariat National Aeronautics and Space Administration 2015."},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.03.019"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2582-0"},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.04.014"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-1045-1"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1505-1"},{"issue":"2","key":"e_1_2_9_9_1","first-page":"178","article-title":"Secure and efficient tree\u2010based group Diffie\u2010Hellman protocol","volume":"3","author":"Hong S","year":"2009","journal-title":"Ksii Trans Int Inf Syst"},{"issue":"7","key":"e_1_2_9_10_1","first-page":"1737","article-title":"Design and performance analysis of queue\u2010based group Diffie\u2010Hellman protocol (QGDH)","volume":"7","author":"Hong S","year":"2013","journal-title":"Ksii Trans Int Inf Syst"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.12.018"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/mma.3802"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.923666"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.920224"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1402"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-019-0186-5"},{"key":"e_1_2_9_17_1","doi-asserted-by":"crossref","unstructured":"LiuYC ZhangAX LiJH WuJ.An anonymous distributed key management system based on CL\u2010PKC for space information network. In: Proc. 2016 IEEE International Conference on Communications (ICC); May2016; New York Malaysia.","DOI":"10.1109\/ICC.2016.7510841"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3358"},{"key":"e_1_2_9_19_1","first-page":"1","article-title":"Utilization of secret sharing technology for secure communication: a state\u2010of\u2010the\u2010art review","author":"Sarosh P","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.061"},{"key":"e_1_2_9_21_1","doi-asserted-by":"crossref","unstructured":"DingC YuanJ.Covering and secret sharing with linear codes. In: Proc. Proceedings of the 4th International conference on Discrete Mathematics and Theoretical Computer Science; July2003; Berlin Heidelberg:11\u201025.","DOI":"10.1007\/3-540-45066-1_2"},{"key":"e_1_2_9_22_1","unstructured":"YuanD HuangRS.A new secret sharing scheme from linear code. In: Proc. 2009 International Conference on Machine Learning and Cybernetics; August 2009; Hebei China:3204\u20103208."},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.077"},{"key":"e_1_2_9_25_1","first-page":"3","article-title":"Group\u2010oriented secret sharing using Shamir's algorithm","author":"Alapati KK","year":"2018","journal-title":"Rutgers Univ\u2010Camden Graduate School"},{"key":"e_1_2_9_26_1","doi-asserted-by":"crossref","unstructured":"TochikuboK.Multiple assignment secret sharing scheme using hierarchical threshold scheme. In: Proc. 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST); December2017; Cambridge United Kingdom:456\u2010461.","DOI":"10.23919\/ICITST.2017.8356447"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.8233663"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJeC.2020010101"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2741580"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2009.03651"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.4841","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/dac.4841","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.4841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T08:02:02Z","timestamp":1692950522000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.4841"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,4]]},"references-count":29,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021,7,25]]}},"alternative-id":["10.1002\/dac.4841"],"URL":"https:\/\/doi.org\/10.1002\/dac.4841","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,4]]},"assertion":[{"value":"2020-07-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-08","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}