Information security. Key management

2021 ◽  
Symmetry ◽  
2019 ◽  
Vol 11 (8) ◽  
pp. 1019
Author(s):  
María Dolores Gómez Olvera ◽  
Juan Antonio López Ramos ◽  
Blas Torrecillas Jover

Key management is a central problem in information security. The development of quantum computation could make the protocols we currently use unsecure. Because of that, new structures and hard problems are being proposed. In this work, we give a proposal for a key exchange in the context of NIST recommendations. Our protocol has a twisted group ring as setting, jointly with the so-called decomposition problem, and we provide a security and complexity analysis of the protocol. A computationally equivalent cryptosystem is also proposed.


2014 ◽  
Vol 926-930 ◽  
pp. 1962-1965
Author(s):  
Chang Liu ◽  
Fang Wang ◽  
Chang Li Sun

The interaction of electricity is one of the basic characteristics of smart grid, for interactive methods of using electricity and the information security risk and demand research. First of all, from the risk perspective, the interaction of electric power information security and wide area environment using power mode under the comparison qualitative, focuses on the differences in the objective conditions. The two in the threat generated subjective motive and the consequences of the accident etc.. On this basis, combined with the characteristics of the interaction system with electric business process and high volume, starting from the confidentiality, integrity and availability of information security requirements refine the usability evaluation, key management and abnormal behavior detection such as the 3 aspects of difficult problems.


2018 ◽  
Vol 17 (02) ◽  
pp. 527-545 ◽  
Author(s):  
Aiiad Albeshri ◽  
Vijey Thayananthan

In the big data processes, management and analytics are primary areas where we can introduce the decision making on information security to mitigate the big data breaches. According to the growing number of online systems and big data handling, mitigating the big data breaches is the serious problem during the processing period which needs to be monitored using appropriate technique. The goal of this research is to prevent the big data breaches using correct decision making based on information security concepts such as access control with authentication which depend on the management policies. The analytical approach of information security solution can also be useful for securing the big data infrastructure and key management that improve the big data breaches. As an analytical method, information security which focuses on detecting and securing the big data breaches is considered with access control. Here, we have introduced the multi-priority model influenced with the network calculus and access control which monitors the breaches during the big data processing. In the results and analysis, we can provide a graph which shows the monitoring improvement for decision making during the mitigation of big data breaches.


2014 ◽  
Vol 27 (5) ◽  
pp. 644-667 ◽  
Author(s):  
Abhishek Narain Singh ◽  
M.P. Gupta ◽  
Amitabh Ojha

Purpose – Despite many technically sophisticated solutions, managing information security has remained a persistent challenge for organizations. Emerging IT/ICT media have posed new security challenges to business information and information assets. It is felt that technical solutions alone are not sufficient to address the information security challenge. It has been argued that organizations also need to consider the management aspects of information security. Consequently, literature, especially in the last decade, has witnessed various scholarly works in this direction. Therefore, a synthesis exercise is required to bring clarity on categorizing the issues of organizational information security management (ISM) to take the research forward. The purpose of this paper is to identify management factors that address organizational information security challenges. Design/methodology/approach – Using a mix method approach, the paper adopts the qualitative (keyword analysis and experts’ opinion) and quantitative (questionnaire survey) research routes. Exploratory factor analysis is conducted to find out the key factors of organizational ISM. Findings – The paper categorizes various organizational ISM functions into ten factors. Spanning across three levels (strategic, tactical and operational), these factors cover various management issues of organizational ISM. Originality/value – The paper takes the ISM literature forward by statistically validating the key management factors of organizational ISM. The study outcome should help to draw the attention of organizations toward the managerial challenges of organizational ISM.


2020 ◽  
Vol 2 (10) ◽  
pp. 54-66
Author(s):  
Andrii Karpenko ◽  
Tetiana Bondarenko ◽  
Viacheslav Ovsiannikov ◽  
Valerii Martyniuk

The problem of information security in wireless sensor networks is considered in this paper. An analysis of existing recommendations for information security in wireless sensor networks. It was found that one of the key problems of information security is the hardware limitations of the sensor nodes of the network. It is substantiated that the use of more complex cryptographic protection mechanisms will increase the load on the network. Safety requirements and their description are given. The main groups and types of information security threats in wireless sensor networks are considered. The classification of attacks and protection of wireless sensor networks according to the OSI model is presented. The existing solutions for information security are considered and analyzed. The shortcomings and vulnerabilities of the considered solutions are revealed. The method of public key cryptography is considered, the main advantages and disadvantages of this method are revealed. The analysis and comparison of ECC and RSA encryption methods are carried out. It is substantiated that the use of ECC in wireless sensor networks is more efficient than RSA. The method of cryptography with a symmetric key is considered, the main advantages and disadvantages of this method are indicated. It was found that cryptographic methods using a symmetric key are more priority for use in wireless sensor networks. Cryptographic key management protocols in wireless sensor networks are considered. The classification of key management protocols is given. Secure routing protocols are considered. The classification of secure routing protocols is given. Methods of secure data aggregation are considered. Contradictions between the requirements for confidentiality and data aggregation have been revealed. The method of intrusion detection is considered, the main advantages and disadvantages of this method are revealed. The results of this work should be used in the design of wireless sensor networks.


Sign in / Sign up

Export Citation Format

Share Document