A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks

نویسندگان

  • Markus Volkmer
  • Sebastian Wallner
چکیده

Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complexity) solution for feasible frequent symmetric key exchange in adhoc networks, based on a Tree Parity Machine Rekeying Architecture. A key exchange can be performed within a few milliseconds, given practical wireless communication channels and their limited bandwidths. A flexible rekeying functionality enables the full exploitation of the achievable key exchange rates. Characteristics of a standardcell ASIC design realisation as IP-core in -technology are evaluated. 1 Key Exchange in Ad-hoc Networks Authentication and key exchange are of supreme importance with regard to security and secure routing in ad-hoc networks. Such networks typically lack infrastructure, which penalises approaches needing a central authority like a trust centre or another third trusted party as e.g. in ID-based cryptosystems. The dynamic and ephemeral network topology demands frequent key exchanges (cf. [KA02] for an unbiased survey). In this regard, cryptographic methods with appropriate computational efficiency, that also consider a certain message or protocol overhead, are inevitable. In ubiquitous and pervasive computing applications, such as sensor networks, RFID-systems or Near Field Communication (NFC), the devices in use as nodes of the network often impose severe size limitations and power consumption constraints. Consequently, the available size for additional cryptographic hardware components is limited as well [KA02, St03, WGP03]. Public key or threshold cryptography are in general computationally intensive and a distributed certificate authority does not address the resource limitations of devices in ad-hoc networks. Asymmetric algorithms for key exchange like RSA and El Gamal perform computationally intensive arithmetics, typically implemented in software on limited microcontrollers. The state-of-the-art is represented by (Hyper-)Elliptic Curve Cryptography (see e.g. [PWP03]). Retaining the security, these representations decrease the size of numbers in the necessary arithmetic operations, but increase the operations’ complexity. Still, a (frequent) key exchange in practice often remains of prohibitive cost.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Energy Cost of Secrets in Ad-hoc Networks (Short Paper)

Energy consumption of cryptographic algorithms and security protocols is a crucial factor in wireless ad-hoc networks. This work explores the energy cost of a key agreement process between two parties of an ad-hoc network using public-key encryption techniques and compares the results with regular networks which use secret-key based key-exchange protocols. Elliptic Curve public-key and Rijndael...

متن کامل

The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

متن کامل

A Fault-Tolerant Key-Distribution Scheme for Securing Wireless Ad Hoc Networks

We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The proposed solution relies solely on symmetric cryptography and therefore is applicable for highly resource-limited devices. In order to avoid a single point of trust, no master device or base station is used. We achiev...

متن کامل

Identity-based Key Exchange Protocols for Ad Hoc Networks

In this work we present a set of authentication and key exchange protocols that use identity-based pre-shared keys from pairings. We show that those protocols are attractive for an implementation in ad hoc networks. We start with introducing a light-weight protocol that uses purely symmetric crypto primitives. We then gradually add more security features. We analyze the security and performance...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004