Identity-based Random Key Predistribution for Army Manets
نویسندگان
چکیده
We address a challenge to developing the Future Force — Army tactical networks require cryptographic keys to implement security services such as encryption and authentication, but current pairwise key establishment approaches using interactive public key techniques are too time-consuming. This paper describes identity-based cryptographic solutions that enable strong security and significantly reduce bandwidth consumption and latency, and provides three main contributions: (a) a description of how identity-based random key predistribution (IBRKP) can be used as a secure and efficient component within an Army tactical mobile ad hoc network (MANET) key management infrastructure; (b) a description of an attack on IBRKP resulting from targeted node compromises as opposed to random node compromises; and (c) a technique that creates “grainy” pool keys that increases security against targeted and random node compromise attacks.
منابع مشابه
Secure On-line Key Generation for MANETs by Fragment Assembly
Traditional key-management requires either the use of public key cryptography or that an on-line trusted third party arbitrate the selection and distribution of symmetric keys to communicating nodes. Recently much work has been published on random key predistribution methods, in which keys are predistributed between a limited set of node pairs and are used to bootstrap other required node pairs...
متن کاملNon-Interactive Hierarchical Pairwise Key Predistribution Scheme with Multi-Level Key Establishment
Networking environments with connectivity, bandwidth and computational constraints such as critical infrastructure networks or MANETs benefit from non-interactive key predistribution capabilities. In these networks, nodes can compute shared keys using public identities without the need for interactions once basic key materials are distributed to them. Motivated by the electric power grid, in th...
متن کاملPre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks
The nature of Mobile Ad hoc NETworks (MANET), demands stringent requirements on primitives that could be used to secure such networks. Mobility imposes restrictions on memory and processor requirements due to limited battery life. The ad hoc nature warrants schemes that could operate for extended periods without referring to a Trusted Authority (TA). Additionally, any enabling scheme for securi...
متن کاملStrongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks
Key establishment is the basic necessary tool in the network security, by which pairs in the network can establish shared keys for protecting their pairwise communications. There have been some key agreement or predistribution schemes with the property that the key can be established without the interaction ([3], [4], [19]). Recently the hierarchical cryptography and the key management for hier...
متن کاملTwo Improvements of Random Key Predistribution for Wireless Sensor Networks
Key distribution is of a critical importance to security of wireless sensor networks (WSNs). Random key predistribution is an acknowledged approach to the key distribution problem. In this paper, we propose and analyze two novel improvements that enhance security provided by the random key predistribution schemes. The first improvement exploits limited length collisions in secure hash functions...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004