SMOCK: A Scalable Method of Cryptographic Key Management For Mission-Critical Networks

نویسندگان

  • Wenbo He
  • Ying Huang
  • Klara Nahrstedt
  • Whay C. Lee
چکیده

In this paper, we study challenges and possible solutions to cryptographic key management in mission-critical networks. Existing symmetric key cryptography mechanisms do not scale well when supporting end-to-end secure and private communication. Existing public key cryptography mechanisms in self-organized ad hoc networks cannot resist a Sybil attack, where a single malicious node presents multiple identities to control a substantial fraction of a network. In this paper, we present a new paradigm of public key cryptography based on combinatorial design, called SMOCK, where nodes combine more than one key to encrypt and decrypt each message. Our key allocation scheme guarantees that a set of keys held by one user is not a subset of keys held by any other user. We show that our proposed method offers efficiency in memory usage, control data exchange, as well as controllable resilience against node captures.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Public Key Cryptography by Centralized offline Server in Mission-Critical Networks

–Mission-Critical networks show great potential in assisted living system, automotive networks, emergency rescue and disaster recovery system, military applications, critical infrastructure monitoring system. To build a secure communication system in that network, usually the first attempt is to employ cryptographic keys. Cryptographic key management is challenging due to the things like unreli...

متن کامل

Public Key Cryptography by Centralized Offline Server in Mission-Critical Networks

Mission-Critical networks show great potential in assisted living system, automotive networks, emergency rescue and disaster recovery system, military applications, critical infrastructure monitoring system. To build a secure communication system in that network, usually the first attempt is to employ cryptographic keys. Cryptographic key management is challenging due to the things like unrelia...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

Scalable Technique of Cryptographic Key in Supervision for Essential to the Success of Wireless Improvised Networks

Abstract:-Essential to the success of networks show great potential in emergency response and/or recovery, health care, critical in-restructure monitoring, etc. Such essential to the success of applications demand that security service be “anywhere,” “anytime,” and “anyhow.” However, it is challenging to design a key in supervision scheme in current essential to the success of networks to fulfi...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006