Hierarchical secret sharing in ad hoc networks through Birkhoff interpolation

被引:2
作者
Ballico, E. [1 ]
Boato, G. [2 ]
Fontanari, C. [1 ]
Granelli, F. [2 ]
机构
[1] Univ Trent, Dept Math, Via Sommarive 14, I-38050 Trento, Italy
[2] Univ Trent, Dept Informat & Commun Technol, I-38050 Trento, Italy
来源
ADVANCES IN COMPUTER, INFORMATION, AND SYSTEMS SCIENCES AND ENGINEERING | 2006年
关键词
D O I
10.1007/1-4020-5261-8_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing ad hoc networks represents a challenging issue, related to their very characteristics of decentralized architecture, low-complexity, and multiple hops communications. Even if several methods are available, this paper presents a novel approach to allow secret sharing of information at lower levels of the node protocol stack. In fact, secret sharing schemes provide a natural way of addressing security issues in ad hoc networks. To this aim, a flexible framework for secure end-to-end transmission of confidential information is proposed which exploits multipath source routing and hierarchical shares distribution. Such a goal is achieved by designing an ideal, perfect, and eventually verifiable secret sharing scheme based on Birkhoff polynomial interpolation and by establishing suitable hierarchies among independent paths.
引用
收藏
页码:157 / +
页数:3
相关论文
共 7 条
[1]  
BUTTYAN L, 2002, MOBILE COMPUTING COM, V6
[2]  
LOU W, 2003, P 9 INT C DISTR MULT, P599
[3]  
MOLVA R, 2003, PERSONAL WIRELESS CO
[4]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[5]  
YI S, 2001, SECURITY AWARE AD HO
[6]   Securing ad hoc networks [J].
Zhou, LD ;
Zygmunt, JH .
IEEE NETWORK, 1999, 13 (06) :24-30
[7]  
RFC, V2401