<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Omsk, Russia</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Implementation of Access Control Models Based on Key Pre-Distribution Schemes</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Sergey V. Belim 1;2</string-name>
          <email>sbelim@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Svetlana Yu. Belim</string-name>
          <email>svbelim@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>1Omsk State Technical University</institution>
          ,
          <addr-line>11 Mira avenue, 644050, Omsk, Russia, 2Siberian State Automobile</addr-line>
          ,
          <institution>and Highway University</institution>
          ,
          <addr-line>5 Mira avenue, 644080, Omsk</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Omsk State Technical University</institution>
          ,
          <addr-line>11 Mira avenue, 644050, Omsk</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>3</volume>
      <fpage>0</fpage>
      <lpage>04</lpage>
      <abstract>
        <p>In distributed information systems, secure communication between subscribers is implemented using encryption of communication channels. The encryption key exchange problem occurs in this case. Public key encryption algorithms can provide such secure communication. But they require more computing resources and work slowly.Therefore, symmetric encryption schemes are very common. Pairwise key schemes are used to maximize information protection. These schemes use their own key for each subscriber pair. This approach creates additional difficulties in storing and using keys for systems with a large number of subscribers. There are also problems with the scalability the network. Key pre-distribution schemes are used for such systems. In these schemes, the key distribution server sends private key materials to network subscribers via secure channels. Additional subscriber information is in the public domain. Encryption keys are computable. The encryption key is calculated on the basis of closed key materials and open information about subscribers. The existing key pre-distribution schemes are based on the principle of enabling each subscriber to interact with each. However, in most distributed systems, there are restrictions on the transmission of information. As a rule, such restrictions are presented in the form of a ban on the interaction for some subscriber pairs. Such a security policy may be represented as a discretionary access control access matrix. Two key pre-distribution schemes have become most common: the Blom's scheme [1] and the KDP-scheme [2]. These two schemes use a different mathematical approach. The Blom's scheme is based on calculating the values for symmetric polynomial over a finite ring. The KDP-scheme uses finite sets. Blom's scheme is widely</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        used to secure wireless networks [
        <xref ref-type="bibr" rid="ref10 ref11 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">3, 4, 5, 6, 7, 8, 9, 10, 11, 12</xref>
        ]. The KDP-scheme is mainly used in networks that
allow subnetwork partitioning [
        <xref ref-type="bibr" rid="ref12 ref13 ref14">13, 14, 15</xref>
        ].
      </p>
      <p>
        The authors have previously modified the key pre-predistribution scheme for mandatory access control [
        <xref ref-type="bibr" rid="ref15 ref16">16, 17</xref>
        ]
and for system with simplex information channels [
        <xref ref-type="bibr" rid="ref17 ref18 ref19">18, 19, 20</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>The Blom's scheme modi cation</title>
      <p>We are looking at a distributed network with n subscribers. Setting of task consists in organization of secure
interaction of network subscribers. Additional conditions are imposed on the interaction of network members.
Some subscribers pairs are not allowed to exchange information. For allowed subscriber pairs, messages are
exchanged using data encryption. All authorized information channels are two-way. Strict recording this access
control is carried out using the access matrix. Rows and columns correspond to network subscribers. The access
matrix cells contain one if the channel is allowed and zero if the channel is denied. The task is to generate and
distribute closed key materials in such a way that for allowed channels both parties can calculate a common
encryption key, and for banned channels the encryption key is zero. We’re putting a limit on the length of the
key. The key must be m bits long.</p>
      <p>In the basic Blom’s scheme [1], the key distribution server generates a symmetric polynomial f (x; y) of degree
2l with random coefficients. All calculations are performed on the deduction ring ZM . This polynomial is stored
in secret on the key generation server and is used to generate key materials. Polynomial degree restrictions are
associated with the number of subscribers in the network. If the number of participants is n, then inequality
must be performed for the polynomial degree l &lt; n. In addition to secret key materials, the scheme uses open
information that is provided by the key distribution server at the subscribers request. The server generates a
unique number ri (i = 1; :::; n) for each network subscriber. The numbers ri (i = 1; :::; n) are open. Secure
key materials are produced individually for each subscriber. In this scheme, the key materials for the user ui
is the polynomial coefficient vector gi(x) = f (x; ri). Secret key materials are transmitted via a secure channel.
The value for the function gi(x) is calculated at the point rj to generate the encryption key kij between the
subscribers ui and uj (kij = gi(rj )). Subscriber uj performs similar operation (kji = gj (ri)). The equality
kij = kji is executed because the polynomial f (x; y) is symmetric. Both members of the information channel
receive the same encryption key.</p>
      <p>The main security problem of the key pre-distribution scheme is resistance to compromising. ompromising is
the ability to obtain the remaining keys by a limited set of known pair encryption keys. The usual Blom scheme
is resistant to compromising l keys[1].</p>
      <p>. It is necessary that for permitted information channels kij ̸= 0, and for banned kij = 0. A zero key
encryption ban is set on the system. This automatically results the discretionary security policy.</p>
      <p>We use the list L of subscriber pairs numbers (i; j), for which a ban on creating information channels has
been introduced. The total number of ban information channels is denoted s. We are modifying the symmetric
polynomial used to produce key materials. We use a polynomial F (x; y) equal to the product of two symmetric
polynomials.</p>
      <p>F (x; y) = d(x; y)f (x; y):
f (x; y) is arbitrary symmetric polynomial with degree 2l.</p>
      <p>The symmetric polynomial d(x; y) satisfies a set of requirements.</p>
      <p>d(ri; rj ) = 0; d(rj ; ri) = 0; f or (i; j) ∈ L; and d(ri; rj ) ̸= 0; d(rj ; ri) ̸= 0; f or (i; j) ̸∈ L:
The polynomial d(x; y) is equal to the product of the polynomials dij (x; y) = 0.</p>
      <p>The equality dij (x; y) = 0 is performed only under the condition ((x = ri)∧(y = rj ))∨((x = rj )∧(y = ri)) = 1.
From the requirement of symmetry for polynomials dij (x; y) it follows that they are representative through
elementary symmetric polynomials.
A quadratic function with two roots satisfies the necessary requirements.</p>
      <p>dij( 1; 2) = ( 1(x; y) − 1(r1; r2))2 + ( 2(x; y) − 2(r1; r2))2;</p>
      <p>Substituting expressions for elementary symmetric polynomials, we obtain the representation the polynomial
through the original variables.</p>
      <p>dij (x; y) = (x + y − ri − rj )2 + (xy − rirj )2:
We write an expression for the polynomial d(x; y).</p>
      <p>((x + y − ri − rj )2 + (xy − rirj )2) :</p>
      <p>Further work is carried out according to the usual Blom’s scheme algorithm with the replacement the
polynomial f (x; y) to the polynomial F (x; y). The degree of the polynomial d(x; y) is determined by the total number
banned information channels s.
(5)
(6)
(7)
(8)
(9)
(10)
(11)
deg d(x; y) = 4s:</p>
      <p>Theorem 1. If the key pre-distribution scheme is based on the polynomial f (x; y) of degree 2l and the
number of banned information channels is s, then the scheme is resistant to compromising l + 2s key materials.</p>
      <p>Theorem 2. If the key pre-distribution scheme is based on the polynomial f (x; y) of degree 2l and the
number of banned information channels is s, then compromising the list of protected information channels is
possible when compromising at least l + 2s key materials.
3</p>
    </sec>
    <sec id="sec-3">
      <title>The KDP-scheme modi cation</title>
      <p>We consider solving the same problem using a modified KDP-scheme. In a common KDP scheme, the key
distribution server sends out a key set K = {k1; :::; km} to all participants over secure channels. This key set is
kept secret. A family of subsets S = {S1; :::; Sn} sets {1; 2; :::; n} is stored in open form. Each member of this
set family is mapped to one subscribers. If the user ui initiates an information channel with the user uj , then
he asks the server subsets Si and Sj . User ui defines the set of elements included in the intersection of sets.</p>
      <p>A family of sets S built using such an algorithm meets the security policy requirements.</p>
      <p>n
Si = ∪ M D[i; j]; (i = 1; :::; n):
j=1
Sij = Si ∩ Sj :
kij = ⊕ kl:</p>
      <p>l2Sij</p>
      <p>The set Sij defines the element numbers of the set K used to calculate the pair encryption key. The encryption
key is defined as a bitwise XOR operation applied to selected elements of the set K.</p>
      <p>All operations are symmetrical, so both participants will receive the same pair key.</p>
      <p>The discretionary security policy is described using the access matrix M . Rows and columns of this matrix
are associated with network subscribers. The allowed data channels correspond to the unit values in the cells of
the access matrix, and the forbidden values are zero. The elements of the subsets family S are selected so that
at M [i; j] = 0, the equality Sij = ∅ is fulfilled, and at M [i; j] = 1, Sij ̸= ∅ is performed.</p>
      <p>We use the auxiliary set of subsets D to build a family S with the desired properties. The number of elements
in the set D is equal to half the number unit elements in the access matrix M . The matrix M is symmetric,
therefore, we limit ourselves only to considering the elements above the main diagonal. The elements of the set
D are constructed as disjoint subsets of the set {1; 2; :::; n}. The number of elements in D = {D1; :::; Dm} is
determined by the number of unit elements above the main diagonal in the matrix M. Enter an additional M D
matrix over the set of subsets of the set {1; 2; :::; n}. The value of the elements is determined by the following
rule: if M [i; j] = 1, then M D[i; j] = Dk, and M D[j; i] = Dk, if M [i; j] = 0, then M D[i; j] = ∅, and M D[j; i] = ∅.
The sets Si are determined based on the elements of the matrix M D arranged in the i-th row.</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>Modifications the Blom’s and KDP key pre-distribution schemes allow the discretionary security policy
implementation for distributed systems. The rights to create information channels are checked automatically when
calculating encryption keys and do not require activation the centralized server. The disadvantage of the
proposed system is an increase the key materials size in the Blom’s scheme. Key materials contain additional
information about banned information channels.
[1] R. Blom. An optimal class of symmetric key generation systems. Proc. of the EUROCRYPT 84 workshop
on Advances in cryptology: theory and application of cryptographic techniques:335-338, 1985.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.J.</given-names>
            <surname>Mitchell</surname>
          </string-name>
          , . Piper.
          <article-title>Key storage in Secure Networks</article-title>
          .
          <source>Discrete and Applied Math</source>
          ,
          <volume>21</volume>
          :
          <fpage>215</fpage>
          -
          <lpage>228</lpage>
          ,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Perrig</surname>
          </string-name>
          .
          <article-title>Designing secure sensor networks</article-title>
          .
          <source>IEEE Wireless Communications</source>
          ,
          <volume>11</volume>
          (
          <issue>6</issue>
          ):
          <fpage>38</fpage>
          -
          <lpage>43</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. V.</given-names>
            <surname>Poor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shamai</surname>
          </string-name>
          . Information Theoretic Security.
          <source>Found. Trends Commun. Inf. Theory</source>
          ,
          <volume>5</volume>
          :
          <fpage>355</fpage>
          -
          <lpage>580</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Parakh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kak</surname>
          </string-name>
          .
          <article-title>Matrix based key agreement algorithms for sensor networks</article-title>
          .
          <source>Fifth IEEE In-ternational Conference on Advanced Telecommunication Systems and Networks (ANTS):1-3</source>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rasheed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mahapatra</surname>
          </string-name>
          .
          <article-title>Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks,”</article-title>
          <source>in IEEE Transactions on Parallel and Distributed Systems</source>
          ,
          <volume>22</volume>
          (
          <issue>1</issue>
          ):
          <fpage>176</fpage>
          -
          <lpage>184</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Bechkit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Challal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bouabdallah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Tarokh</surname>
          </string-name>
          .
          <article-title>A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks</article-title>
          .
          <source>in IEEE Transactions on Wireless Communications</source>
          ,
          <volume>12</volume>
          (
          <issue>2</issue>
          ):
          <fpage>948</fpage>
          -
          <lpage>959</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>H.</given-names>
            <surname>Chan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Perrig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Song</surname>
          </string-name>
          .
          <article-title>Random Key Pre-distribution Schemes for Sensor Networks</article-title>
          .
          <source>IEEE Symposium on Security and Privacy:</source>
          <fpage>197</fpage>
          -
          <lpage>213</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Guan</surname>
          </string-name>
          .
          <article-title>A key pre-distribution scheme using deployment knowledge for wireless sensor networks</article-title>
          .
          <source>IPSN</source>
          <year>2005</year>
          :
          <fpage>261</fpage>
          -
          <lpage>268</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rasheed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mahapatra</surname>
          </string-name>
          .
          <article-title>An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks</article-title>
          .
          <source>2008 IEEE International Performance, Computing and Communications Conference:</source>
          <fpage>264</fpage>
          -
          <lpage>270</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <surname>M. B. Paterson</surname>
            ,
            <given-names>D. R.</given-names>
          </string-name>
          <string-name>
            <surname>Stinson</surname>
          </string-name>
          .
          <article-title>A unified approach to combinatorial key predistribution schemes for sensor networks</article-title>
          .
          <source>Des. Codes Cryptogr</source>
          .,
          <volume>71</volume>
          :
          <fpage>433</fpage>
          -
          <lpage>457</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>K.</given-names>
            <surname>Panyim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Krishnamurthy</surname>
          </string-name>
          .
          <article-title>A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks</article-title>
          .
          <source>Mobile Netw Appl.</source>
          ,
          <volume>17</volume>
          :
          <fpage>327</fpage>
          -
          <lpage>341</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Ota</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. Liu.</surname>
          </string-name>
          <article-title>ActiveTrust: secure and trustable routing in wireless sensor net-works</article-title>
          .
          <source>IEEE Transactions on Information Forensics and Security</source>
          ,
          <volume>11</volume>
          (
          <issue>9</issue>
          ):
          <fpage>2013</fpage>
          -
          <lpage>2027</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.-W.</given-names>
            <surname>Chin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Raad</surname>
          </string-name>
          .
          <article-title>Approximation algorithms for broadcasting in duty cycled wire-less sensor networks</article-title>
          .
          <source>Wireless Networks</source>
          ,
          <volume>20</volume>
          (
          <issue>8</issue>
          ):
          <fpage>2219</fpage>
          -
          <lpage>2236</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Dong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          .
          <article-title>Bulk data dissemination in wireless sensor networks: analysis, implications and improvement</article-title>
          .
          <source>IEEE Transactions on Computers</source>
          ,
          <volume>65</volume>
          (
          <issue>5</issue>
          ):
          <fpage>1428</fpage>
          -
          <lpage>1439</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Belim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yu</surname>
          </string-name>
          . Belim.
          <article-title>Mandatory access control implementation in the distributed systems</article-title>
          .
          <source>Automatic Control and Computer Sciences</source>
          ,
          <volume>52</volume>
          (
          <issue>8</issue>
          ):
          <fpage>1124</fpage>
          -
          <lpage>1126</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Belim</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.Yu. Belim.</surname>
          </string-name>
          <article-title>The modification of Blom's key predistribution scheme, taken into account simplex channels</article-title>
          .
          <source>Automatic Control and Computer Sciences</source>
          ,
          <volume>52</volume>
          (
          <issue>8</issue>
          ):
          <fpage>1134</fpage>
          -
          <lpage>1137</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Belim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yu</surname>
          </string-name>
          . Belim.
          <article-title>Implementation of simplex channels in the Blom's keys pre-distribution scheme</article-title>
          .
          <source>Journal of Physics: Conf. Series</source>
          ,
          <volume>1210</volume>
          :
          <fpage>012008</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Belim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yu</surname>
          </string-name>
          . Belim.
          <article-title>Use the keys pre-distribution KDP-scheme for mandatory access control implementation</article-title>
          .
          <source>Journal of Physics: Conf. Series</source>
          ,
          <volume>1210</volume>
          :
          <fpage>012009</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S.V.</given-names>
            <surname>Belim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yu</surname>
          </string-name>
          . Belim.
          <article-title>Vector key pre-distribution scheme</article-title>
          .
          <source>Journal of Physics: Conf. Series</source>
          ,
          <volume>1441</volume>
          :
          <fpage>012033</fpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>