Secure group communication schemes for dynamic heterogeneous distributed computing

被引:22
作者
Castiglione, Arcangelo [1 ]
D'Arco, Paolo [1 ]
De Santis, Alfredo [1 ]
Russo, Rosario [1 ]
机构
[1] Univ Salerno, Dept Comp Sci, Via Giovanni Paolo 2 132, I-84084 Fisciano, SA, Italy
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2017年 / 74卷
关键词
Heterogeneous distributed computing; Secure group communication; Key predistribution; Sensor Networks; Ad Hoc Networks; Performance analysis; AD-HOC; NETWORKS;
D O I
10.1016/j.future.2015.11.026
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays Sensor Networks and Ad Hoc Networks are widely used communication facilities, mainly because of their many application settings. Again, though above types of network are paradigms of communication widespread and well-established in the state of the art, however, they turn out to be among the most important concepts underlying the modern and increasingly expanding User-Centric Networks, which can be used to build dynamic middleware services for heterogeneous distributed computing. In this way, can be addressed the strong dynamic behavior of user communities and of resource collections they use. In this paper we focus our attention on key predistribution for secure communications in those types of networks. In particular, we first analyze some schemes proposed in the literature for enabling a group of two or more nodes to compute a common key, which can be used later on to encrypt or authenticate exchanged messages. The schemes we have chosen are well representative of different design strategies proposed in the state of the art. Moreover, in order to find out under which conditions and in which settings a scheme is more suitable than others, we provide an evaluation and a performance comparison of those schemes. Furthermore, we look at the problem of identifying optimal values for the parameters of such schemes, with respect to a certain desirable security degree and reasonable security assumptions. Finally, we extend one of those schemes, showing both analytically and through experiments, the improvement the new scheme provides in terms of security compared to the basic one. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:313 / 324
页数:12
相关论文
共 23 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], 2003, PROC 1 ACM WORKSHOP
[3]  
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[4]   Perfectly secure key distribution for dynamic conferences [J].
Blundo, C ;
De Santis, A .
INFORMATION AND COMPUTATION, 1998, 146 (01) :1-23
[5]  
Castiglione Arcangelo, 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems, P157, DOI 10.1109/INCoS.2013.32
[6]   Modeling energy-efficient secure communications in multi-mode wireless mobile devices [J].
Castiglione, Arcangelo ;
Palmieri, Francesco ;
Fiore, Ugo ;
Castiglione, Aniello ;
De Santis, Alfredo .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (08) :1464-1478
[7]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[8]   Middleware and architectures for space-based and situated computing [J].
Cristea, Valentin ;
Dobre, Ciprian ;
Costan, Alexandru ;
Pop, Florin .
INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2011, 1 (01) :43-58
[9]  
Donggang Liu, 2005, ACM Transactions on Information and Systems Security, V8, P41, DOI 10.1145/1053283.1053287
[10]  
DYER M, 1995, J CRYPTOL, V8, P189, DOI 10.1007/BF00191355