A Scheme for Key Management on Alternate Temporal Key Hash
نویسندگان
چکیده
Wired equivalent privacy encryption of IEEE 802.11 standard is based on the RC4 stream cipher, but the weakness in its Initialization Vector (IV) derivation causes the Key Scheduling Algorithm (KSA) of RC4 to leak out the information about the secret key. It is shared among the particular participants in the Wireless LAN (WLAN). Housley et al. proposed an Alternate Temporal Key Hash (ATKH) to solve the weakness of the KSA; they defeated the particular IV may make the KSA to leak out the information about the shared secret key. However, the ATKH did not solve the key management in WLAN. Since a robust key management is a critical factor to prevent the eavesdropping from attackers. Therefore, in this paper, we shall propose a scheme to make key management feasible in their solution without changing the framework of the ATKH and the existing 802.11 standards.
منابع مشابه
A novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملA Random Key Management Scheme Based on Hash Chain in Wireless Sensor Networks
Key Management Scheme is an important factor to improve the safety performance of Wireless Sensor Networks (WSNs). The existing schemes can’t simultaneously meet the high demand of connectivity and anti-destruction to WSNs. We propose a key management scheme base on random Hash chain. The scheme firstly does multidimensional treatment for the key pool, and then uses a Hash Function to hash the ...
متن کاملSome observations on a lightweight authentication scheme with capabilities of anonymity and trust in Internet of Things (IoT)
Over the last years, the concept of Internet of Things (IoT) leads to a revolution in the communications of humans and things. Security and efficiency could be the main challenges of that communication. On the other hand, authenticity and confidentiality are two important goals to provide desired security in an information system, including IoT-based applications. An Authentication an...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملA Group Key Management Scheme Based on Random Transmission for VANET
Group key management plays an important role in ensuring the safety and reliability of the VANET (vehicular ad-hoc network) over the channel. Through considering the characteristics of VANET communication and topology, a VANET group key management scheme is proposed based on random transmission which is combined with the construction of polynomial and key updating by Hash chain. The scheme achi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 1 شماره
صفحات -
تاریخ انتشار 2005