Survey of key management schemes for cluster networks

With the rapid development of artificial intelligence and communication network technology, increasing attention has been paid to cluster intelligence.Cluster network is an important part of cluster intelligence, the security of information interaction has attracted much attention, and cluster key m...

Full description

Saved in:
Bibliographic Details
Main Authors: Jun LIU, Lin YUAN, Zhishang FENG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022082
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529673113141248
author Jun LIU
Lin YUAN
Zhishang FENG
author_facet Jun LIU
Lin YUAN
Zhishang FENG
author_sort Jun LIU
collection DOAJ
description With the rapid development of artificial intelligence and communication network technology, increasing attention has been paid to cluster intelligence.Cluster network is an important part of cluster intelligence, the security of information interaction has attracted much attention, and cluster key management has become a research hotspot in network information security.In recent years, many cluster key management schemes have been proposed, which provide effective solutions for information security interaction of complex cluster network systems.The existing cluster key management schemes were analyzed and summarized, and the future research direction and application scenarios were discussed.The typical three-layer cluster network model was introduced, including the control layer, cluster head layer and node layer.The characteristics of cluster network were summarized, such as large number and scale, dynamic topology change, and hierarchical cluster heterogeneity.According to the key management strategy and cluster networking scenarios, the cluster key management process before and after the network deployment was summarized.The key management evaluation index was analyzed from the aspects of security, efficiency, and flexibility.Then, three key management schemes including pre-distribution management, healing management and dynamic management were discussed.Their basic ideas, advantages and disadvantages were analyzed, and their performance from the aspects of techniques, security, flexibility, and efficiency was compared.Besides, the research hotspots related to cluster key management were prospected from cross-domain heterogeneity, cluster authentication, healing mechanism, and technology fusion.The security function of cluster key management in future application scenarios such as ubiquitous IoT, all-domain operation, and smart city was discussed.
format Article
id doaj-art-12069b57c0604b0b9c1434b8f15cbf3b
institution Kabale University
issn 2096-109X
language English
publishDate 2022-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-12069b57c0604b0b9c1434b8f15cbf3b2025-01-15T03:16:02ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2022-12-018526959574428Survey of key management schemes for cluster networksJun LIULin YUANZhishang FENGWith the rapid development of artificial intelligence and communication network technology, increasing attention has been paid to cluster intelligence.Cluster network is an important part of cluster intelligence, the security of information interaction has attracted much attention, and cluster key management has become a research hotspot in network information security.In recent years, many cluster key management schemes have been proposed, which provide effective solutions for information security interaction of complex cluster network systems.The existing cluster key management schemes were analyzed and summarized, and the future research direction and application scenarios were discussed.The typical three-layer cluster network model was introduced, including the control layer, cluster head layer and node layer.The characteristics of cluster network were summarized, such as large number and scale, dynamic topology change, and hierarchical cluster heterogeneity.According to the key management strategy and cluster networking scenarios, the cluster key management process before and after the network deployment was summarized.The key management evaluation index was analyzed from the aspects of security, efficiency, and flexibility.Then, three key management schemes including pre-distribution management, healing management and dynamic management were discussed.Their basic ideas, advantages and disadvantages were analyzed, and their performance from the aspects of techniques, security, flexibility, and efficiency was compared.Besides, the research hotspots related to cluster key management were prospected from cross-domain heterogeneity, cluster authentication, healing mechanism, and technology fusion.The security function of cluster key management in future application scenarios such as ubiquitous IoT, all-domain operation, and smart city was discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022082cluster networkkey managementinformation securitycluster authenticationhealing mechanism
spellingShingle Jun LIU
Lin YUAN
Zhishang FENG
Survey of key management schemes for cluster networks
网络与信息安全学报
cluster network
key management
information security
cluster authentication
healing mechanism
title Survey of key management schemes for cluster networks
title_full Survey of key management schemes for cluster networks
title_fullStr Survey of key management schemes for cluster networks
title_full_unstemmed Survey of key management schemes for cluster networks
title_short Survey of key management schemes for cluster networks
title_sort survey of key management schemes for cluster networks
topic cluster network
key management
information security
cluster authentication
healing mechanism
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022082
work_keys_str_mv AT junliu surveyofkeymanagementschemesforclusternetworks
AT linyuan surveyofkeymanagementschemesforclusternetworks
AT zhishangfeng surveyofkeymanagementschemesforclusternetworks