Soliman and omari 5 have proposed a security

Info icon This preview shows pages 27–29. Sign up to view the full content.

Soliman and Omari 5 have proposed a security framework based on stream cipher for encryption to provide the services of data confidentiality, Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 27

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Authentication and Confidentiality in Wireless Ad Hoc Networks 15 data integrity, and authentication. This framework ensures per packet mutual authentication between the two communicating nodes within the network. The objective of using stream cipher is to allow online processing of the data. Consequently, minimum delay is introduced because of the security provisioning. Two secret security keys, Secret Authentication Key (SAK) and Secret Session Key (SSK), are used for authentication of the supplicant and authenticator. SAK is exchanged between the supplicant and the authenticator after initial mutual authentication from the authen- tication server, whereas the SSK is used for a given communication session between the two nodes. The SAK and SSK pair is used by the commu- nicating nodes to generate the permutation vector (PV) which is used for the encryption and decryption of data. In the strongest mode of security, the data is also involved in the PV generation, resulting in the random- ness which makes the decryption of the data difficult even if the encryption key of one packet is compromised. The synchronization of the generated permutation vector between the sender and the receiver of the data results in origin authentication of every MPDU. To minimize the security over- head, plain text MPDU is XORed with the PV generated for that MPDU. The authors have proved that the encryption of data using PV provides strong security services of data confidentiality, data integrity, and origin authentication. Junaid et al. 15 have proposed a piggyback challenge-response protocol, which relies on Advanced Encryption Standard (AES) in Counter Mode 30 for providing data confidentiality. AES in counter mode requires a counter block and an encryption key to encrypt the message. The message is divided into blocks of 128 bits and each block is encrypted using the encryption key and a unique counter block (see Ref. 30 for details). The authors propose the extension to IEEE 802.11i 4 key generation mechanism as shown in Figure 3. The temporal key (TK) generated through IEEE 802.11i using four-way handshake is used as seed for the pseudo-random function (PRF- 128) to generate the initial counter. This initial counter is used as the AES initial counter block, which is linearly incremented to generate subsequent counter blocks. The initial counter is also used as the first nonce N 0 , which is transmitted with the first message.
Image of page 28
Image of page 29
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '12
  • Kushal Kanwar
  • Public key infrastructure, ........., Public-key cryptography, Pretty Good Privacy

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern