基于多项式的机器人系统密钥管理方案

秦云川, Qi Xiao
{"title":"基于多项式的机器人系统密钥管理方案","authors":"秦云川, Qi Xiao","doi":"10.1145/3036331.3050418","DOIUrl":null,"url":null,"abstract":"With the robots being applied for more and more fields, security issues attracted more attention. In this paper, we propose that the key center in cloud send a polynomial information to each robot component, the component would put their information into the polynomial to get a group of new keys using in next slot, then check and update its key groups after success in hash. Because of the degree of the polynomial is higher than the number of components, even if an attacker got all the key values of the components, he also cannot restore the polynomial. The information about the keys will be discarded immediately after used, so an attacker cannot obtain the session key used before by the invasion of a component. This article solves the security problems about robotic system caused by cyber-attacks and physical attacks.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"10 1","pages":"105-108"},"PeriodicalIF":0.0000,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Polynomial-based Key Management Scheme for robotic system\",\"authors\":\"秦云川, Qi Xiao\",\"doi\":\"10.1145/3036331.3050418\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the robots being applied for more and more fields, security issues attracted more attention. In this paper, we propose that the key center in cloud send a polynomial information to each robot component, the component would put their information into the polynomial to get a group of new keys using in next slot, then check and update its key groups after success in hash. Because of the degree of the polynomial is higher than the number of components, even if an attacker got all the key values of the components, he also cannot restore the polynomial. The information about the keys will be discarded immediately after used, so an attacker cannot obtain the session key used before by the invasion of a component. This article solves the security problems about robotic system caused by cyber-attacks and physical attacks.\",\"PeriodicalId\":22356,\"journal\":{\"name\":\"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)\",\"volume\":\"10 1\",\"pages\":\"105-108\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-01-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3036331.3050418\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3036331.3050418","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

随着机器人在越来越多领域的应用,安全问题也越来越受到关注。在本文中,我们提出了云中的密钥中心向每个机器人组件发送一个多项式信息,组件将它们的信息放入该多项式中以获得下一个槽中使用的一组新密钥,然后在哈希成功后检查和更新其密钥组。由于多项式的程度高于分量的数量,即使攻击者获得了分量的所有关键值,也无法还原多项式。密钥的相关信息在使用后会立即被丢弃,因此攻击者无法获得入侵组件之前使用的会话密钥。解决了网络攻击和物理攻击给机器人系统带来的安全问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Polynomial-based Key Management Scheme for robotic system
With the robots being applied for more and more fields, security issues attracted more attention. In this paper, we propose that the key center in cloud send a polynomial information to each robot component, the component would put their information into the polynomial to get a group of new keys using in next slot, then check and update its key groups after success in hash. Because of the degree of the polynomial is higher than the number of components, even if an attacker got all the key values of the components, he also cannot restore the polynomial. The information about the keys will be discarded immediately after used, so an attacker cannot obtain the session key used before by the invasion of a component. This article solves the security problems about robotic system caused by cyber-attacks and physical attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
ICCMS 2022: The 14th International Conference on Computer Modeling and Simulation, Chongqing, China, June 24 - 26, 2022 ICCMS 2021: The 13th International Conference on Computer Modeling and Simulation, Melbourne, VIC, Australia, June 25 - 27, 2021 Wheelchair Navigation System using Node Combination Technique for People with Motor Disabilities Reaeration and Dispersion Coefficients Prediction for a River Flow by Implementing Machine Learning Algorithm on MIKE Dataset ICCMS '20: The 12th International Conference on Computer Modeling and Simulation, Brisbane, QLD, Australia, June 22-24, 2020
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1