Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of wireless ad-hoc networks (WAHNs) and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure communications. Exclusion basis systems (EBS) provide a framework for scalable and efficient group key manage...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 203 |
---|---|
container_issue | |
container_start_page | 199 |
container_title | |
container_volume | |
creator | Younis, M. Ghumman, K. Eltoweissy, M. |
description | Due to the dynamic nature of wireless ad-hoc networks (WAHNs) and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure communications. Exclusion basis systems (EBS) provide a framework for scalable and efficient group key management where the number of keys per node and the number of re-key messages can be relatively adjusted. EBS-based solutions, however, may suffer from collusion attacks, where a number of nodes may collaborate to reveal all system keys and consequently capture the network. In this paper we investigate the collusion problem in EBS and demonstrate that a careful assignment of keys to nodes reduces collusion. Since an optimal assignment is NP hard, we propose a location-based heuristic where keys are assigned to neighboring nodes depending on the Hamming distance between the strings of bits representing the used subset of the keys. |
doi_str_mv | 10.1109/PCCC.2005.1460553 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1460553</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1460553</ieee_id><sourcerecordid>1460553</sourcerecordid><originalsourceid>FETCH-LOGICAL-i148t-73e5e9d012c8ce0ee68bb0f1c7ce4584e855a22ba14b806dfeec0a29cec74b713</originalsourceid><addsrcrecordid>eNotkM1KxDAUhYM_4DjOA4ibvEDrTZo0iTspjoojutD1kKa3Gm3ToakOfXsDDhw4cM_57uIQcskgZwzM9WtVVTkHkDkTJUhZHJEFL5TITMn1MVkZpSGp0MYweUIWiVEZLwU7I-cxfgGkiKsFeX7CmfY22A_sMUzUB7r3I3YYI7UN_RwcDTjth_E73lA3dN1P9EOgCejm6FMnNHQ34m9i0_2CnLa2i7g6-JK8r-_eqods83L_WN1uMs-EnjJVoETTAONOOwTEUtc1tMwph0JqgVpKy3ltmag1lE2L6MBy49ApUStWLMnV_1-PiNvd6Hs7ztvDEsUf8ptRcQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Key management in wireless ad hoc networks: collusion analysis and prevention</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Younis, M. ; Ghumman, K. ; Eltoweissy, M.</creator><creatorcontrib>Younis, M. ; Ghumman, K. ; Eltoweissy, M.</creatorcontrib><description>Due to the dynamic nature of wireless ad-hoc networks (WAHNs) and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure communications. Exclusion basis systems (EBS) provide a framework for scalable and efficient group key management where the number of keys per node and the number of re-key messages can be relatively adjusted. EBS-based solutions, however, may suffer from collusion attacks, where a number of nodes may collaborate to reveal all system keys and consequently capture the network. In this paper we investigate the collusion problem in EBS and demonstrate that a careful assignment of keys to nodes reduces collusion. Since an optimal assignment is NP hard, we propose a location-based heuristic where keys are assigned to neighboring nodes depending on the Hamming distance between the strings of bits representing the used subset of the keys.</description><identifier>ISSN: 1097-2641</identifier><identifier>ISBN: 9780780389915</identifier><identifier>ISBN: 0780389913</identifier><identifier>EISSN: 2374-9628</identifier><identifier>DOI: 10.1109/PCCC.2005.1460553</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; Application software ; Business ; Computer network management ; Computer science ; Cryptography ; Data security ; Information security ; Intelligent networks ; Military computing</subject><ispartof>PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005, 2005, p.199-203</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1460553$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1460553$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Younis, M.</creatorcontrib><creatorcontrib>Ghumman, K.</creatorcontrib><creatorcontrib>Eltoweissy, M.</creatorcontrib><title>Key management in wireless ad hoc networks: collusion analysis and prevention</title><title>PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005</title><addtitle>PCCC</addtitle><description>Due to the dynamic nature of wireless ad-hoc networks (WAHNs) and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure communications. Exclusion basis systems (EBS) provide a framework for scalable and efficient group key management where the number of keys per node and the number of re-key messages can be relatively adjusted. EBS-based solutions, however, may suffer from collusion attacks, where a number of nodes may collaborate to reveal all system keys and consequently capture the network. In this paper we investigate the collusion problem in EBS and demonstrate that a careful assignment of keys to nodes reduces collusion. Since an optimal assignment is NP hard, we propose a location-based heuristic where keys are assigned to neighboring nodes depending on the Hamming distance between the strings of bits representing the used subset of the keys.</description><subject>Ad hoc networks</subject><subject>Application software</subject><subject>Business</subject><subject>Computer network management</subject><subject>Computer science</subject><subject>Cryptography</subject><subject>Data security</subject><subject>Information security</subject><subject>Intelligent networks</subject><subject>Military computing</subject><issn>1097-2641</issn><issn>2374-9628</issn><isbn>9780780389915</isbn><isbn>0780389913</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkM1KxDAUhYM_4DjOA4ibvEDrTZo0iTspjoojutD1kKa3Gm3ToakOfXsDDhw4cM_57uIQcskgZwzM9WtVVTkHkDkTJUhZHJEFL5TITMn1MVkZpSGp0MYweUIWiVEZLwU7I-cxfgGkiKsFeX7CmfY22A_sMUzUB7r3I3YYI7UN_RwcDTjth_E73lA3dN1P9EOgCejm6FMnNHQ34m9i0_2CnLa2i7g6-JK8r-_eqods83L_WN1uMs-EnjJVoETTAONOOwTEUtc1tMwph0JqgVpKy3ltmag1lE2L6MBy49ApUStWLMnV_1-PiNvd6Hs7ztvDEsUf8ptRcQ</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Younis, M.</creator><creator>Ghumman, K.</creator><creator>Eltoweissy, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>2005</creationdate><title>Key management in wireless ad hoc networks: collusion analysis and prevention</title><author>Younis, M. ; Ghumman, K. ; Eltoweissy, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i148t-73e5e9d012c8ce0ee68bb0f1c7ce4584e855a22ba14b806dfeec0a29cec74b713</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Ad hoc networks</topic><topic>Application software</topic><topic>Business</topic><topic>Computer network management</topic><topic>Computer science</topic><topic>Cryptography</topic><topic>Data security</topic><topic>Information security</topic><topic>Intelligent networks</topic><topic>Military computing</topic><toplevel>online_resources</toplevel><creatorcontrib>Younis, M.</creatorcontrib><creatorcontrib>Ghumman, K.</creatorcontrib><creatorcontrib>Eltoweissy, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Younis, M.</au><au>Ghumman, K.</au><au>Eltoweissy, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Key management in wireless ad hoc networks: collusion analysis and prevention</atitle><btitle>PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005</btitle><stitle>PCCC</stitle><date>2005</date><risdate>2005</risdate><spage>199</spage><epage>203</epage><pages>199-203</pages><issn>1097-2641</issn><eissn>2374-9628</eissn><isbn>9780780389915</isbn><isbn>0780389913</isbn><abstract>Due to the dynamic nature of wireless ad-hoc networks (WAHNs) and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure communications. Exclusion basis systems (EBS) provide a framework for scalable and efficient group key management where the number of keys per node and the number of re-key messages can be relatively adjusted. EBS-based solutions, however, may suffer from collusion attacks, where a number of nodes may collaborate to reveal all system keys and consequently capture the network. In this paper we investigate the collusion problem in EBS and demonstrate that a careful assignment of keys to nodes reduces collusion. Since an optimal assignment is NP hard, we propose a location-based heuristic where keys are assigned to neighboring nodes depending on the Hamming distance between the strings of bits representing the used subset of the keys.</abstract><pub>IEEE</pub><doi>10.1109/PCCC.2005.1460553</doi><tpages>5</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1097-2641 |
ispartof | PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005, 2005, p.199-203 |
issn | 1097-2641 2374-9628 |
language | eng |
recordid | cdi_ieee_primary_1460553 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Ad hoc networks Application software Business Computer network management Computer science Cryptography Data security Information security Intelligent networks Military computing |
title | Key management in wireless ad hoc networks: collusion analysis and prevention |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T03%3A34%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Key%20management%20in%20wireless%20ad%20hoc%20networks:%20collusion%20analysis%20and%20prevention&rft.btitle=PCCC%202005.%2024th%20IEEE%20International%20Performance,%20Computing,%20and%20Communications%20Conference,%202005&rft.au=Younis,%20M.&rft.date=2005&rft.spage=199&rft.epage=203&rft.pages=199-203&rft.issn=1097-2641&rft.eissn=2374-9628&rft.isbn=9780780389915&rft.isbn_list=0780389913&rft_id=info:doi/10.1109/PCCC.2005.1460553&rft_dat=%3Cieee_6IE%3E1460553%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1460553&rfr_iscdi=true |