The values of x and n are transmitted on a pre

Info icon This preview shows pages 26–28. Sign up to view the full content.

View Full Document Right Arrow Icon
The values of x and n are transmitted on a pre-decided control channel. The transmitted messages are also encrypted using symmetric encryption, resulting in a second level of security. The receiver first receives the x th component and using this component, regenerates the remaining message components by repeatedly applying the XOR operation. The components are then placed in order to regenerate the original message. The proposed technique is flexible because Diversity Coding (which splits a single commu- nicational channel into multiple component channels) can be used instead of multi-path routing. Furthermore, asymmetric cryptography can be used to encrypt each component message to provide stronger level of confidentiality Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 26

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
14 A. Naveed and S. Kanhere and origin authentication. However, the message spliting and reassembling can introduce considerable computational overhead and additional delay. D C3 C1 + C3 C2 + C4 C4 + C1 C5 + C2 (x,n)=(3,6) S Fig. 2. Message spliting for data confidentiality. Another technique proposed by Michell et al. 28 is a state based key hop protocol based on stream ciphers. The authors have proposed the use of the RC4 algorithm, however, unlike WEP where the state of RC4 is reinitialized for every packet, the authors propose that same seed should be used to generate the streams for a specific duration of time. The issue of a weak key is avoided by using a stream offset. The offset indicates the starting point down the stream from which the packet encryption should start. The two communicating nodes are synchronized such that the nodes know the initial seed for the stream (Base key), duration for which the key remains valid, RC4 states, and the offset. The RC4 states define the offset for the subsequent packets after the first packet is transmitted using initial offset. After the fixed duration, the base key expires and new base keys should be achieved (hence the name key hop) and the states should be re-synchronized by the two nodes. Note that no method is detailed for distribution of the synchronization parameters among the two nodes. The proposed algorithm offers a strong and light weight encryption algorithm and reduced computational overhead. However, the issue of distributing the parameters required for synchronization is not addressed. Knowledge of these parameters can enable an adversary to easily decrypt the entire communication between any pair of nodes. Therefore, a secure method for distribution of these parameters is of utmost importance for the secure operation of the protocol.
Image of page 27
Image of page 28
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern