Signal-flow-based analysis of wireless security protocols

被引:8
作者
Capar, Cagatay [1 ]
Goeckel, Dennis [1 ]
Paterson, Kenneth G. [2 ]
Quaglia, Elizabeth A. [2 ]
Towsley, Don [1 ]
Zafer, Murtaza
机构
[1] Univ Massachusetts, Amherst, MA 01003 USA
[2] Univ London, London WC1E 7HU, England
基金
美国国家科学基金会;
关键词
Security protocols; Wireless; Cost; Linear System; Physical layer; Key exchange; NONINTERACTIVE KEY DISTRIBUTION; AGREEMENT PROTOCOLS; PERFORMANCE;
D O I
10.1016/j.ic.2013.03.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security protocols operating over wireless channels can incur significant communication costs (e.g., energy, delay), especially under adversarial attacks unique to the wireless environment such as signal jamming, fake signal transmission, etc. Since wireless devices are resource constrained, it is important to optimize security protocols for wireless environments by taking into account their communication costs. Towards this goal, we first present a novel application of a signal-flow-based approach to analyze the communication costs of security protocols in the presence of adversaries. Our approach models a protocol run as a dynamic probabilistic system and then utilizes Linear System theory to evaluate the moment generating function of the end-to-end cost. Applying this technique to the problem of secret key exchange over a wireless channel, we quantify the efficiency of existing families of key exchange cryptographic protocols, showing, for example, that an ID-based approach can offer an almost 10-fold improvement in energy consumption when compared to a traditional PKI-based protocol. We then present a new key exchange protocol that combines traditional cryptographic methods with physical-layer techniques, including the use of "ephemeral" spreading codes, cooperative jamming, and role-switching. Utilizing signal flow analysis, we demonstrate that this new protocol offers performance advantages over traditional designs. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:37 / 56
页数:20
相关论文
共 43 条
  • [1] [Anonymous], LNCS
  • [2] [Anonymous], SCIS
  • [3] [Anonymous], INFOCOM 2010 IEEE
  • [4] [Anonymous], PROTOCOLS FOR AUTHEN
  • [5] [Anonymous], 2008, 2008 IEEE MIL COMM C
  • [6] [Anonymous], WIMOB
  • [7] [Anonymous], 2001, INT C THEORY APPL CR, DOI DOI 10.1007/3-540-45682-1_30
  • [8] [Anonymous], IRE T CIRCUIT THEORY
  • [9] Robust Key Generation from Signal Envelopes in Wireless Networks
    Azimi-Sadjadi, Babak
    Kiayias, Aggelos
    Mercado, Alejandra
    Yener, Bulent
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 401 - +
  • [10] Performance Evaluation and Model Checking Join Forces
    Baier, Christel
    Haverkort, Boudewijn R.
    Hermanns, Holger
    Katoen, Joost-Pieter
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (09) : 76 - 85