{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:18:42Z","timestamp":1772911122803,"version":"3.50.1"},"reference-count":32,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,23]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management. Many key management schemes are devised that each one is suitable for a specific range of applications. However, these schemes have some common drawbacks like the hardness of key generation and distribution, key storage, attacks, and traffic load. In this article, a key management framework is proposed, which is attack resistant and transforms the current customary key management workflow to enhance security and reduce weaknesses. The main features of the proposed framework are eliminating key storage, smart attack resistant feature, reducing multiple-times key distribution to just one-time interpreter distribution, and having short key intervals \u2013 minutely, hourly, and daily. Moreover, the key revocation process happens automatically and with no revocation call.<\/jats:p>","DOI":"10.1515\/comp-2020-0167","type":"journal-article","created":{"date-parts":[[2022,2,26]],"date-time":"2022-02-26T07:24:55Z","timestamp":1645860295000},"page":"17-26","source":"Crossref","is-referenced-by-count":15,"title":["SIKM \u2013 a smart cryptographic key management framework"],"prefix":"10.1515","volume":"12","author":[{"given":"Saman Shojae","family":"Chaeikar","sequence":"first","affiliation":[{"name":"Department of Information Security, Faculty of Computer Engineering, Iranians University an e-Institute of Higher Education , Tehran , Iran"}]},{"given":"Ali","family":"Ahmadi","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence, Faculty of Computer Engineering, K. N. Toosi University of Technology , Tehran , Iran"}]},{"given":"Sasan","family":"Karamizadeh","sequence":"additional","affiliation":[{"name":"Department of ICT Security, ICT Research Institute , Tehran , Iran"}]},{"given":"Nakisa Shoja","family":"Chaeikar","sequence":"additional","affiliation":[{"name":"Department of Information Security, Faculty of Computer Engineering, Iranians University an e-Institute of Higher Education , Tehran , Iran"}]}],"member":"374","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"2022081707553231414_j_comp-2020-0167_ref_001","doi-asserted-by":"crossref","unstructured":"F. Gandino, C. Celozzi, and M. Rebaudengo, \u201cA key management scheme for mobile wireless sensor networks,\u201d Appl. Sci., vol. 7, no. 5, p. 490, 2017.","DOI":"10.3390\/app7050490"},{"key":"2022081707553231414_j_comp-2020-0167_ref_002","doi-asserted-by":"crossref","unstructured":"E. Barker, W. Barker, Recommendation for key management, part 2: best practices for key management organization, Technical report, National Institute of Standards and Technology, 2018.","DOI":"10.6028\/NIST.SP.800-57pt2r1"},{"key":"2022081707553231414_j_comp-2020-0167_ref_003","doi-asserted-by":"crossref","unstructured":"E. Yuan and L. Wang, \u201cA key management scheme realising location privacy protection for heterogeneous wireless sensor networks,\u201d Int. J. Sensor Netw., vol. 32, no. 1, pp. 34\u201341, 2020.","DOI":"10.1504\/IJSNET.2020.104461"},{"key":"2022081707553231414_j_comp-2020-0167_ref_004","doi-asserted-by":"crossref","unstructured":"G. Xu, X.-B. Chen, Z. Dou, Y.-X. Yang, and Z. Li, \u201cA novel protocol for multiparty quantum key management,\u201d Quantum Inform. Process., vol. 14, no. 8, pp. 2959\u20132980, 2015.","DOI":"10.1007\/s11128-015-1021-1"},{"key":"2022081707553231414_j_comp-2020-0167_ref_005","doi-asserted-by":"crossref","unstructured":"S. S. Chaeikar, H. S. Moghaddam, and H. R. Zeidanloo, \u201cNode based interpretative key management framework,\u201d in: Security and Management,  Las Vegas, USA: WORLDCOMP, 2010, pp. 204\u2013210.","DOI":"10.1109\/ICCRD.2010.54"},{"key":"2022081707553231414_j_comp-2020-0167_ref_006","doi-asserted-by":"crossref","unstructured":"J. Han and J. Wang, \u201cAn enhanced key management scheme for LoRaWAN,\u201d Cryptography, vol. 2, no. 4, pp. 34, 2018.","DOI":"10.3390\/cryptography2040034"},{"key":"2022081707553231414_j_comp-2020-0167_ref_007","doi-asserted-by":"crossref","unstructured":"A. Mazin, K. Davaslioglu, and R. D. Gitlin, \u201cSecure key management for 5g physical layer security,\u201d in: 2017 IEEE 18th Wireless and Microwave Technology Conference (WAMICON), Cocoa Beach, FL, USA: IEEE, 2017, pp. 1\u20135.","DOI":"10.1109\/WAMICON.2017.7930246"},{"key":"2022081707553231414_j_comp-2020-0167_ref_008","doi-asserted-by":"crossref","unstructured":"J. Liu, X. Tong, Z. Wang, M. Zhang, and J. Ma, \u201cA centralized key management scheme based on mceliece pkc for space network,\u201d IEEE Access, vol. 8, pp. 42708\u201342719, 2020.","DOI":"10.1109\/ACCESS.2020.2976753"},{"key":"2022081707553231414_j_comp-2020-0167_ref_009","doi-asserted-by":"crossref","unstructured":"S. S. Chaeikar, S. Yazdanpanah, and N. S. Chaeikar, \u201cSecure sms transmission based on social network messages,\u201d Int. J. Internet Technol. Secured Trans., vol. 11, no. 2, pp. 176\u2013192, 2021.","DOI":"10.1504\/IJITST.2021.10035680"},{"key":"2022081707553231414_j_comp-2020-0167_ref_010","doi-asserted-by":"crossref","unstructured":"S. R. Singh and K. K. Ajoy, \u201cKey management scheme for internet of things using an elliptic curve,\u201d J. Comput. Theoret. Nanosci., vol. 17, no. 1, pp. 115\u2013121, 2020.","DOI":"10.1166\/jctn.2020.8637"},{"key":"2022081707553231414_j_comp-2020-0167_ref_011","doi-asserted-by":"crossref","unstructured":"G. Manikandan and U. Sakthi, \u201cA comprehensive survey on various key management schemes in WSN,\u201d in: 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), Palladam, India: IEEE, 2018, pp. 378\u2013383.","DOI":"10.1109\/I-SMAC.2018.8653656"},{"key":"2022081707553231414_j_comp-2020-0167_ref_012","doi-asserted-by":"crossref","unstructured":"A. Joshi and A. K. Mohapatra, \u201cAuthentication protocols for wireless body area network with key management approach,\u201d J. Discrete Math. Sci. Cryptograph., vol. 22, no. 2, pp. 219\u2013240, 2019.","DOI":"10.1080\/09720529.2019.1582869"},{"key":"2022081707553231414_j_comp-2020-0167_ref_013","doi-asserted-by":"crossref","unstructured":"Y. Tian, Z. Wang, J. Xiong, and J. Ma, \u201cA blockchain-based secure key management scheme with trustworthiness in DWSNs,\u201d IEEE Trans. Industr. Inform., vol. 16, no. 9, pp. 6193\u20136202, 2020.","DOI":"10.1109\/TII.2020.2965975"},{"key":"2022081707553231414_j_comp-2020-0167_ref_014","unstructured":"M. Alizadeh, M. Salleh, M. Zamani, J. Shayan, S. Karamizadeh, Security and performance evaluation of lightweight cryptographic algorithms in RFID, The 16th WSEAS International Conference on Communications (part of CSCC \u201812), Kos Island, Greece, July 14\u201317, 2012."},{"key":"2022081707553231414_j_comp-2020-0167_ref_015","doi-asserted-by":"crossref","unstructured":"J. Shen, H. Tan, S. Moh, I. Chung, Q. Liu, and X. Sun, \u201cEnhanced secure sensor association and key management in wireless body area networks,\u201d J. Commun. Netw., vol. 17, no. 5, pp. 453\u2013462, 2015.","DOI":"10.1109\/JCN.2015.000083"},{"key":"2022081707553231414_j_comp-2020-0167_ref_016","doi-asserted-by":"crossref","unstructured":"L. Zhang, \u201cKey management scheme for secure channel establishment in fog computing,\u201d IEEE Trans. Cloud Comput., vol. 9, no. 3, pp. 1117\u201328, 2019.","DOI":"10.1109\/TCC.2019.2903254"},{"key":"2022081707553231414_j_comp-2020-0167_ref_017","doi-asserted-by":"crossref","unstructured":"S. ShojaeChaeikar, A. A. Manaf, A. A. Alarood, and M. Zamani, \u201cPFW: polygonal fuzzy weighted an svm kernel for the classification of overlapping data groups,\u201d Electronics, vol. 9, no. 4, p. 615, 2020.","DOI":"10.3390\/electronics9040615"},{"key":"2022081707553231414_j_comp-2020-0167_ref_018","doi-asserted-by":"crossref","unstructured":"Y. Harchol, I. Abraham, and B. Pinkas, \u201cDistributed ssh key management with proactive rsa threshold signatures,\u201d in: International Conference on Applied Cryptography and Network Security, Leuven, Belgium: Springer, 2018, pp. 22\u201343.","DOI":"10.1007\/978-3-319-93387-0_2"},{"key":"2022081707553231414_j_comp-2020-0167_ref_019","doi-asserted-by":"crossref","unstructured":"A. Ghosal and M. Conti, \u201cKey management systems for smart grid advanced metering infrastructure: A survey,\u201d IEEE Commun. Surveys Tutorials, vol. 21, no. 3, pp. 2831\u20132848, 2019.","DOI":"10.1109\/COMST.2019.2907650"},{"key":"2022081707553231414_j_comp-2020-0167_ref_020","doi-asserted-by":"crossref","unstructured":"S. S. Chaeikar, M. Alizadeh, M. H. Tadayon, and A. Jolfaei, \u201cAn intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems,\u201d Int. J. Intell. Syst., 2021.","DOI":"10.1002\/int.22435"},{"key":"2022081707553231414_j_comp-2020-0167_ref_021","doi-asserted-by":"crossref","unstructured":"M. Ma, G. Shi, and F. Li, \u201cPrivacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the iot scenario,\u201d IEEE Access, vol. 7, pp. 34045\u201334059, 2019.","DOI":"10.1109\/ACCESS.2019.2904042"},{"key":"2022081707553231414_j_comp-2020-0167_ref_022","doi-asserted-by":"crossref","unstructured":"J. Sen, \u201cCryptography and security in computing,\u201d BoD\u2013Books on Demand,  London: IntechOpen, 2012.","DOI":"10.5772\/2213"},{"key":"2022081707553231414_j_comp-2020-0167_ref_023","doi-asserted-by":"crossref","unstructured":"S. S. Chaeikar, A. Jolfaei, N. Mohammad, and P. Ostovari, \u201cSecurity principles and challenges in electronic voting,\u201d in: 2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW), Gold Coast, Australia: IEEE, 2021, pp. 38\u201345.","DOI":"10.1109\/EDOCW52865.2021.00030"},{"key":"2022081707553231414_j_comp-2020-0167_ref_024","doi-asserted-by":"crossref","unstructured":"M. S. Yousefpoor and H. Barati, \u201cDynamic key management algorithms in wireless sensor networks: A survey,\u201d Comput. Commun., vol. 134, pp. 52\u201369, 2019.","DOI":"10.1016\/j.comcom.2018.11.005"},{"key":"2022081707553231414_j_comp-2020-0167_ref_025","doi-asserted-by":"crossref","unstructured":"T. Pramod, K. G. Boroojeni, M. H. Amini, N. Sunitha, and S. Iyengar, \u201cKey pre-distribution scheme with join leave support for scada systems,\u201d Int J. Critic. Infrastruct. Protect., vol. 24, pp. 111\u2013125, 2019.","DOI":"10.1016\/j.ijcip.2018.10.011"},{"key":"2022081707553231414_j_comp-2020-0167_ref_026","unstructured":"S. Yazdanpanah and S. S. Chaeikar, \u201cIKM-based security usability enhancement model,\u201d Int. J. Comput. Sci. Inf. Technol. Secur., vol. 2, no. 4, pp. 852\u2013858, 2012."},{"key":"2022081707553231414_j_comp-2020-0167_ref_027","doi-asserted-by":"crossref","unstructured":"L. Li, G. Xu, L. Jiao, X. Li, H. Wang, J. Hu, et al., \u201cA secure random key distribution scheme against node replication attacks in industrial wireless sensor systems,\u201d  IEEE Trans. Ind. Inform., vol. 16, no. 3, pp. 2091\u20132101, 2019.","DOI":"10.1109\/TII.2019.2927296"},{"key":"2022081707553231414_j_comp-2020-0167_ref_028","doi-asserted-by":"crossref","unstructured":"S. Mandal, S. Mohanty, and B. Majhi, \u201cCL-AGKA: Certificateless authenticated group key agreement protocol for mobile networks,\u201d Wireless Netw., vol. 26, pp. 3011\u20133031, 2020. 10.1007\/s11276-020-02252-z.","DOI":"10.1007\/s11276-020-02252-z"},{"key":"2022081707553231414_j_comp-2020-0167_ref_029","unstructured":"S. S. Chaeikar, A. B. A. Manaf, and M. Zamani, \u201cComparative analysis of master-key and interpretative key management (IKM) frameworks,\u201d Cryptograph. Security Comput., vol. 203, pp. 203\u2013218, 2012."},{"key":"2022081707553231414_j_comp-2020-0167_ref_030","doi-asserted-by":"crossref","unstructured":"R. L. Naik, S. S. S. Reddy, and M. G. Chand, \u201cToward secure quantum key distribution protocol for super dense coding attack: A hybrid approach,\u201d in: Data Engineering and Communication Technology, Singapore: Springer, 2020, pp. 515\u2013525.","DOI":"10.1007\/978-981-15-1097-7_43"},{"key":"2022081707553231414_j_comp-2020-0167_ref_031","doi-asserted-by":"crossref","unstructured":"M. Griotti, F. Gandino, and M. Rebaudengo, \u201cTransitory master key transport layer security for WSNS,\u201d IEEE Access, vol. 8, pp. 20304\u201320312, 2020.","DOI":"10.1109\/ACCESS.2020.2969050"},{"key":"2022081707553231414_j_comp-2020-0167_ref_032","doi-asserted-by":"crossref","unstructured":"S. S. Chaeikar, S. AbdRazak, S. Honarbakhsh, H. R. Zeidanloo, M. Zamani, and F. Jaryani, \u201cInterpretative key management (IKM), a novel framework,\u201d in: 2010 Second International Conference on Computer Research and Development, Kuala Lumpur, Malaysia: IEEE, 2010, pp. 265\u2013269.","DOI":"10.1109\/ICCRD.2010.54"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0167\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0167\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T07:59:13Z","timestamp":1660723153000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2020-0167\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,3,16]]},"published-print":{"date-parts":[[2022,3,16]]}},"alternative-id":["10.1515\/comp-2020-0167"],"URL":"https:\/\/doi.org\/10.1515\/comp-2020-0167","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}