Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (6): 52-69.doi: 10.11959/j.issn.2096-109x.2022082

• Topic: Techniques and applications of cryptography • Previous Articles     Next Articles

Survey of key management schemes for cluster networks

Jun LIU, Lin YUAN, Zhishang FENG   

  1. Information Engineering University, Zhengzhou 450001, China
  • Revised:2022-11-06 Online:2022-12-15 Published:2023-01-16
  • Supported by:
    The National Natural Science Foundation of China(61902427)

Abstract:

With the rapid development of artificial intelligence and communication network technology, increasing attention has been paid to cluster intelligence.Cluster network is an important part of cluster intelligence, the security of information interaction has attracted much attention, and cluster key management has become a research hotspot in network information security.In recent years, many cluster key management schemes have been proposed, which provide effective solutions for information security interaction of complex cluster network systems.The existing cluster key management schemes were analyzed and summarized, and the future research direction and application scenarios were discussed.The typical three-layer cluster network model was introduced, including the control layer, cluster head layer and node layer.The characteristics of cluster network were summarized, such as large number and scale, dynamic topology change, and hierarchical cluster heterogeneity.According to the key management strategy and cluster networking scenarios, the cluster key management process before and after the network deployment was summarized.The key management evaluation index was analyzed from the aspects of security, efficiency, and flexibility.Then, three key management schemes including pre-distribution management, healing management and dynamic management were discussed.Their basic ideas, advantages and disadvantages were analyzed, and their performance from the aspects of techniques, security, flexibility, and efficiency was compared.Besides, the research hotspots related to cluster key management were prospected from cross-domain heterogeneity, cluster authentication, healing mechanism, and technology fusion.The security function of cluster key management in future application scenarios such as ubiquitous IoT, all-domain operation, and smart city was discussed.

Key words: cluster network, key management, information security, cluster authentication, healing mechanism

CLC Number: 

No Suggested Reading articles found!