Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Symmetric Key Cryptography or Secret Key Cryptography

Handbook of Research on Mobility and Computing: Evolving Technologies and Ubiquitous Impacts
In symmetric key cryptography, the algorithms for encryption and decryption make use of the same key. Consequently, both sender and receiver share the same key that is agreed before communication.
Published in Chapter:
Secure Techniques for Remote Reconfiguration of Wireless Embedded Systems
Abdellah Touhafi (Vrije Universiteit Brussel, Belgium), An Braeken (Erasmushogeschool Brussel, Belgium), Gianluca Cornetta (Universidad CEU San Pablo, Spain), Nele Mentens (Katholieke Universiteit Leuven, Belgium), and Kris Steenhaut (Vrije Universiteit Brussel, Belgium)
DOI: 10.4018/978-1-60960-042-6.ch058
Abstract
The aim of this chapter is to give a thorough overview of secure remote reconfiguration technologies for wireless embedded systems, and of the communication standard commonly used in those systems. In particular, we focus on basic security mechanisms both at hardware and protocol level. We will discuss the possible threats and their corresponding impact level. Different countermeasures for avoiding these security issues are explained. Finally, we present a complete and compact solution for a service-oriented architecture enabling secure remote reconfiguration of wireless embedded systems, called the STRES system.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR