6 conclusions efficient choice of key distribution

Info icon This preview shows pages 75–77. Sign up to view the full content.

6. Conclusions Efficient choice of key distribution schemes for facilitating cryptographic SAs between devices forming MANETs have to take several factors into account. Irrespective of the specific routing protocol used, both one-to-one SAs (pairwise secrets) and one-to-many SAs are required. Furthermore every mobile device should be considered as two distinct agents: i) a light- weight, tamper-responsive network agent (in practice, a SIM card plugged into a mobile computer); and ii) a more capable user agent (a general purpose mobile computer). The SIM card protects and performs computa- tions with secrets used for authenticating routing information. The network agent secrets should be protected from the owner (the user) of the device. Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 75

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Key Distribution 63 The secrets assigned to the user agent can be used for securing application layer data and for non-repudiation to make the user agent “take responsi- bility” for packets aired from his/her mobile device. The need for lowering the complexity of the network agent (in order to render the SIM card inexpensive and trustworthy) calls for restricting the network agent to symmetric cryptographic computations. Because storage is an inexpensive resource for mobile devices, light weight key predistribu- tion schemes like MLS and KSSC are well suited for establishing pairwise secrets between network agents. Such secrets can be used for establishing one-hop and two-hop secrets to protect the integrity of routing data for all routing protocols. In general, one-to-many authentication schemes are more expensive compared to one-to-one schemes like KSSC and MLS. Network agents can afford to use OTS schemes as long as they are used infrequently due to the bandwidth overhead required for the signature and authenticating public commitments (tens of hashes). However, it is possible to efficiently employ OTS to disseminate commitments for other one-to-many schemes like the delay sensitive TESLA broadcast authentication scheme and delay insensi- tive per-use hash chain schemes. As user agents are less resource constrained, user agents can employ conventional digital signatures for non-repudiation. Under such a scenario, the threat of being ejected from the network can serve as an effective de- terrent for users desiring to break the rules imposed by routing protocols for selfish gains. References 1. D. Boneh, M. Franklin, “Identity-based encryption from the Weil pairing,” Advances in Cryptology – Crypto’2001, Lecture Notes on Computer Science 2139, Springer-Verlag (2001), pp. 213-229.
Image of page 76
Image of page 77
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • Kushal Kanwar
  • Public key infrastructure, ........., Public-key cryptography, Pretty Good Privacy

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern