5 choice of key distribution schemes the secrets

Info icon This preview shows pages 65–67. Sign up to view the full content.

View Full Document Right Arrow Icon
5. Choice of Key Distribution Schemes The secrets assigned to network agents and user agents will be used by the agents for computing/verifying application layer, network-layer and link- layer SAs. More specifically, we would desire to employ 1) the secrets protected by the SIM cards to authenticate all routing data; and 2) the secrets assigned to the user agent for authenticating/protecting the privacy of application layer data exchanged between end-points. The specific choice of KDSs will need to consider trade-offs between cost and requirements. From the perspective of cost we would ideally like to limit network agents to KSSC or MLS, and user agents to MLS, as (arguably) storage is the cheapest of all resources. We would also like to avoid one-to-many associations (like digital signatures, one-time signatures and TESLA) to the extent possible. However, there are many scenarios where the use of one-to-many SAs are necessary. More specifically, one-to-many schemes are compelling in scenarios where the number of potential verifiers are large. Furthermore, they are unavoidable in scenarios where the sender does not know the iden- tities of the potential verifiers. In this section we shall investigate such specific scenarios where the use of one-to-many SAs is either compelling or Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 65

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Key Distribution 53 mandatory. In such scenarios it is obviously desirable to limit the network agent to employ OTS, TESLA, or PU hash chains. However, the specifics of how they can be used to authenticate routing data will depend on the specific nature of the routing protocol. 5.1. Brief Overview of MANET Routing Protocols Similar to routing protocols for wired networks, MANET routing protocols can also be broadly classified into distance-vector (DV) and link-state (LS) based approaches. In LS based protocols the link-state of every node in- dicating the sender, a sequence number, lifetime of the packet, and a list of neighbors, is sent to all nodes in the subnet. This will enable every node to determine the entire topology of the subnet, and thereby compute the shortest path to any destination. Such LS packets (with increasing se- quence numbers) are created and sent periodically to keep up with dynamic changes in topology. In the table-based DV approach every node periodically sends a table to all its neighbors indicating the distance to every node in the subnet. In each period, the table sent by a node is accompanied by a fresh sequence number. Nodes which have no knowledge of other nodes (for example, a node which has just entered a subnet) will also send a “table” with one row indicating the “distance to itself (0),” and a sequence number. Eventually,
Image of page 66
Image of page 67
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern