Physical separation between the network and user

Info icon This preview shows pages 63–65. Sign up to view the full content.

Physical separation between the network and user agents is indeed ex- isting practice in mobile telephone networks, where the network agent of a mobile A is the SIM card provided by the network operator. The user agent can choose any mobile phone operated, manufactured by any vendor. The SIM card, provided by the network operator, is what carries the secrets necessary for the user to take part in the network. Obviously different sets of secrets will be needed for the user and network agents of the same mobile device. More specifically, the secrets assigned to the user agent should be used only for securing application layer data exchanged between end-points. The user agent secrets can be privy to the owner of the mobile. Thus no hardware protection of such secrets are required. It is also desirable that the network operators do not have access to the user’s application layer secrets. After all, end-users rely on the network only for delivering the packets. The network agent secrets should be used for authenticating routing data. It is obviously desirable to ensure that the end-user does not have d Tamper-responsive computers respond to intrusions by zeroizing their secrets. Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 63

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Key Distribution 51 access to the network agent secrets. Thus, computations using the net- work agent secrets should be performed only inside the SIM card. The network agent secrets can, however, be stored encrypted outside the SIM card (encrypted using a secret stored inside the SIM card). In such scenarios, it is desirable to reduce the computational overhead inside the tamper-responsive boundary. Obviously, limiting the network agent to only symmetric primitives has some compelling advantages. In such scenarios the SIM card can consist of an elementary processor with a hardware block-cipher or hash function, which could be re-used for all computations. Low computational overhead translates to low heat dissipa- tion, which in turn implies that strategies for shielding the SIM card from intrusions (aimed at exposing the network agent secrets) will be less con- strained. Furthermore, lowering the complexity of the computing engine in the SIM card will also permit easier verification of the integrity of the SIM card. This will permit realization of trustworthy SIM cards, at a low cost. 4.4. User Agent and Network Agent KDSs KSSC and MLS are ideally suited for the network agent as 1) storage for encrypted secrets for KSSC, or public values for MLS, is not an issue; and 2) KSSC and MLS impose very low computational burden inside the SIM card - a few tens of hashes for KSSC, and one hash for MLS.
Image of page 64
Image of page 65
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • Kushal Kanwar
  • Public key infrastructure, ........., Public-key cryptography, Pretty Good Privacy

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern