MuGKeG: Secure Multi-channel Group Key Generation Algorithm for Wireless Networks

被引:0
作者
Naumana Ayub
Mamoon Raja
Saad Saleh
Muhammad U. Ilyas
机构
[1] City University,Department of Electrical and Electronic Engineering, School of Mathematics, Computer Science and Engineering
[2] Tufts University,Department of Computer Science
[3] National University of Sciences and Technology (NUST),School of Electrical Engineering and Computer Science (SEECS)
[4] University of Jeddah,Department of Computer Science, Faculty of Computing and Information Technology
来源
Wireless Personal Communications | 2017年 / 96卷
关键词
Security; Wireless networks; Group key generation;
D O I
暂无
中图分类号
学科分类号
摘要
The broadcast nature of communication channels in infrastructureless wireless networks poses challenges to security. In this paper, we propose a novel technique namely secure multi-channel group key generation (MuGKeG) algorithm. We utilize the available channels switching behaviour between multiple nodes to hide our key from eavesdropper. We provide descriptions for an illustrative base case of three users and one eavesdropper and expand it for the case of N users with C channels and M eavesdroppers. Repeated application of the MuGKeG algorithm on the order of O(logN)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O(\log {N})$$\end{document} allows scaling the size of the group in the order of millions. We provide an analytical closed-form solution for the entropy of the secret group key generated when eavesdroppers follow an optimal attack strategy, and verify it by ns-3 simulations. Comparison with previous state-of-the-art schemes suggests that MuGKeG can provide upto 20 kbps increase in secrecy rate with a scalable key size.
引用
收藏
页码:4799 / 4818
页数:19
相关论文
共 11 条
[1]  
Basilico N(2014)Security games for node localization through verifiable multilateration IEEE Transactions on Dependable and Secure Computing 11 72-85
[2]  
Gatti N(2010)Improving wireless physical layer security via cooperating relays IEEE Transactions on Signal Processing 58 1875-1888
[3]  
Monga M(2009)Key establishment schemes against storage-bounded adversaries in wireless sensor networks IEEE Transactions on Wireless Communications 8 1218-1222
[4]  
Sicari S(undefined)undefined undefined undefined undefined-undefined
[5]  
Dong L(undefined)undefined undefined undefined undefined-undefined
[6]  
Han Z(undefined)undefined undefined undefined undefined-undefined
[7]  
Petropulu AP(undefined)undefined undefined undefined undefined-undefined
[8]  
Poor HV(undefined)undefined undefined undefined undefined-undefined
[9]  
Tsai SC(undefined)undefined undefined undefined undefined-undefined
[10]  
Tzeng WG(undefined)undefined undefined undefined undefined-undefined