SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks

被引:24
作者
He, Wenbo [1 ]
Huang, Ying [2 ]
Sathyam, Ravishankar [2 ]
Nahrstedt, Klara [2 ]
Lee, Whay C. [3 ]
机构
[1] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
[2] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
[3] Motorola Labs, Marlborough, MA 01752 USA
关键词
Combinatorial key management; security in ubiquitous computing;
D O I
10.1109/TIFS.2008.2009601
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mission-critical networks show great potential in emergency response and/or recovery, health care, critical infrastructure monitoring, etc. Such mission-critical applications demand that security service be "anywhere," "anytime," and "anyhow." However, it is challenging to design a key management scheme in current mission-critical networks to fulfill the required attributes of secure communications, such as data integrity, authentication, confidentiality, nonrepudiation, and service availability. In this paper, we present a self-contained public key-management scheme, a scalable method of cryptograph c key management (SMOCK), which achieves almost zero communication overhead for authentication, and offers high service availability. In our scheme, a small number of cryptographic keys are stored offline at individual nodes before they are deployed in the network. To provide good scalability in terms of the number of nodes and storage space, we utilize a combinatorial design of public-private key pairs, which means nodes combine more than one key pair to encrypt and decrypt messages. We also show that SMOCK provides controllable resilience when malicious nodes compromise a limited number of nodes before key revocation and renewal.
引用
收藏
页码:140 / 150
页数:11
相关论文
共 26 条
[1]  
[Anonymous], 2 ANN PKI RES WORKSH
[2]  
[Anonymous], 2003, Proceedings of the 10th ACM conference on Computer and communications security
[3]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[4]  
CAMTEPE SA, 2004, P 9 EUR S RES COMP S, P346
[5]   Self-organized public-key management for mobile ad hoc networks [J].
Capkun, S ;
Buttyán, L ;
Hubaux, JP .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2003, 2 (01) :52-64
[6]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[7]  
Cheng A., 2005, P 2005 ACM SIGCOMM W, P128, DOI DOI 10.1145/1080192.1080202
[8]  
DELGOSHA F, 2006, P 25 IEEE INT C COMP, P1
[9]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[10]  
Du W., 2003, CCS 03, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]