Key management in wireless ad hoc networks: collusion analysis and prevention

Due to the dynamic nature of wireless ad-hoc networks (WAHNs) and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure communications. Exclusion basis systems (EBS) provide a framework for scalable and efficient group key manage...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Younis, M., Ghumman, K., Eltoweissy, M.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 203
container_issue
container_start_page 199
container_title
container_volume
creator Younis, M.
Ghumman, K.
Eltoweissy, M.
description Due to the dynamic nature of wireless ad-hoc networks (WAHNs) and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure communications. Exclusion basis systems (EBS) provide a framework for scalable and efficient group key management where the number of keys per node and the number of re-key messages can be relatively adjusted. EBS-based solutions, however, may suffer from collusion attacks, where a number of nodes may collaborate to reveal all system keys and consequently capture the network. In this paper we investigate the collusion problem in EBS and demonstrate that a careful assignment of keys to nodes reduces collusion. Since an optimal assignment is NP hard, we propose a location-based heuristic where keys are assigned to neighboring nodes depending on the Hamming distance between the strings of bits representing the used subset of the keys.
doi_str_mv 10.1109/PCCC.2005.1460553
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1460553</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1460553</ieee_id><sourcerecordid>1460553</sourcerecordid><originalsourceid>FETCH-LOGICAL-i148t-73e5e9d012c8ce0ee68bb0f1c7ce4584e855a22ba14b806dfeec0a29cec74b713</originalsourceid><addsrcrecordid>eNotkM1KxDAUhYM_4DjOA4ibvEDrTZo0iTspjoojutD1kKa3Gm3ToakOfXsDDhw4cM_57uIQcskgZwzM9WtVVTkHkDkTJUhZHJEFL5TITMn1MVkZpSGp0MYweUIWiVEZLwU7I-cxfgGkiKsFeX7CmfY22A_sMUzUB7r3I3YYI7UN_RwcDTjth_E73lA3dN1P9EOgCejm6FMnNHQ34m9i0_2CnLa2i7g6-JK8r-_eqods83L_WN1uMs-EnjJVoETTAONOOwTEUtc1tMwph0JqgVpKy3ltmag1lE2L6MBy49ApUStWLMnV_1-PiNvd6Hs7ztvDEsUf8ptRcQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Key management in wireless ad hoc networks: collusion analysis and prevention</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Younis, M. ; Ghumman, K. ; Eltoweissy, M.</creator><creatorcontrib>Younis, M. ; Ghumman, K. ; Eltoweissy, M.</creatorcontrib><description>Due to the dynamic nature of wireless ad-hoc networks (WAHNs) and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure communications. Exclusion basis systems (EBS) provide a framework for scalable and efficient group key management where the number of keys per node and the number of re-key messages can be relatively adjusted. EBS-based solutions, however, may suffer from collusion attacks, where a number of nodes may collaborate to reveal all system keys and consequently capture the network. In this paper we investigate the collusion problem in EBS and demonstrate that a careful assignment of keys to nodes reduces collusion. Since an optimal assignment is NP hard, we propose a location-based heuristic where keys are assigned to neighboring nodes depending on the Hamming distance between the strings of bits representing the used subset of the keys.</description><identifier>ISSN: 1097-2641</identifier><identifier>ISBN: 9780780389915</identifier><identifier>ISBN: 0780389913</identifier><identifier>EISSN: 2374-9628</identifier><identifier>DOI: 10.1109/PCCC.2005.1460553</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; Application software ; Business ; Computer network management ; Computer science ; Cryptography ; Data security ; Information security ; Intelligent networks ; Military computing</subject><ispartof>PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005, 2005, p.199-203</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1460553$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1460553$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Younis, M.</creatorcontrib><creatorcontrib>Ghumman, K.</creatorcontrib><creatorcontrib>Eltoweissy, M.</creatorcontrib><title>Key management in wireless ad hoc networks: collusion analysis and prevention</title><title>PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005</title><addtitle>PCCC</addtitle><description>Due to the dynamic nature of wireless ad-hoc networks (WAHNs) and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure communications. Exclusion basis systems (EBS) provide a framework for scalable and efficient group key management where the number of keys per node and the number of re-key messages can be relatively adjusted. EBS-based solutions, however, may suffer from collusion attacks, where a number of nodes may collaborate to reveal all system keys and consequently capture the network. In this paper we investigate the collusion problem in EBS and demonstrate that a careful assignment of keys to nodes reduces collusion. Since an optimal assignment is NP hard, we propose a location-based heuristic where keys are assigned to neighboring nodes depending on the Hamming distance between the strings of bits representing the used subset of the keys.</description><subject>Ad hoc networks</subject><subject>Application software</subject><subject>Business</subject><subject>Computer network management</subject><subject>Computer science</subject><subject>Cryptography</subject><subject>Data security</subject><subject>Information security</subject><subject>Intelligent networks</subject><subject>Military computing</subject><issn>1097-2641</issn><issn>2374-9628</issn><isbn>9780780389915</isbn><isbn>0780389913</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkM1KxDAUhYM_4DjOA4ibvEDrTZo0iTspjoojutD1kKa3Gm3ToakOfXsDDhw4cM_57uIQcskgZwzM9WtVVTkHkDkTJUhZHJEFL5TITMn1MVkZpSGp0MYweUIWiVEZLwU7I-cxfgGkiKsFeX7CmfY22A_sMUzUB7r3I3YYI7UN_RwcDTjth_E73lA3dN1P9EOgCejm6FMnNHQ34m9i0_2CnLa2i7g6-JK8r-_eqods83L_WN1uMs-EnjJVoETTAONOOwTEUtc1tMwph0JqgVpKy3ltmag1lE2L6MBy49ApUStWLMnV_1-PiNvd6Hs7ztvDEsUf8ptRcQ</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Younis, M.</creator><creator>Ghumman, K.</creator><creator>Eltoweissy, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>2005</creationdate><title>Key management in wireless ad hoc networks: collusion analysis and prevention</title><author>Younis, M. ; Ghumman, K. ; Eltoweissy, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i148t-73e5e9d012c8ce0ee68bb0f1c7ce4584e855a22ba14b806dfeec0a29cec74b713</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Ad hoc networks</topic><topic>Application software</topic><topic>Business</topic><topic>Computer network management</topic><topic>Computer science</topic><topic>Cryptography</topic><topic>Data security</topic><topic>Information security</topic><topic>Intelligent networks</topic><topic>Military computing</topic><toplevel>online_resources</toplevel><creatorcontrib>Younis, M.</creatorcontrib><creatorcontrib>Ghumman, K.</creatorcontrib><creatorcontrib>Eltoweissy, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Younis, M.</au><au>Ghumman, K.</au><au>Eltoweissy, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Key management in wireless ad hoc networks: collusion analysis and prevention</atitle><btitle>PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005</btitle><stitle>PCCC</stitle><date>2005</date><risdate>2005</risdate><spage>199</spage><epage>203</epage><pages>199-203</pages><issn>1097-2641</issn><eissn>2374-9628</eissn><isbn>9780780389915</isbn><isbn>0780389913</isbn><abstract>Due to the dynamic nature of wireless ad-hoc networks (WAHNs) and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure communications. Exclusion basis systems (EBS) provide a framework for scalable and efficient group key management where the number of keys per node and the number of re-key messages can be relatively adjusted. EBS-based solutions, however, may suffer from collusion attacks, where a number of nodes may collaborate to reveal all system keys and consequently capture the network. In this paper we investigate the collusion problem in EBS and demonstrate that a careful assignment of keys to nodes reduces collusion. Since an optimal assignment is NP hard, we propose a location-based heuristic where keys are assigned to neighboring nodes depending on the Hamming distance between the strings of bits representing the used subset of the keys.</abstract><pub>IEEE</pub><doi>10.1109/PCCC.2005.1460553</doi><tpages>5</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1097-2641
ispartof PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005, 2005, p.199-203
issn 1097-2641
2374-9628
language eng
recordid cdi_ieee_primary_1460553
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Ad hoc networks
Application software
Business
Computer network management
Computer science
Cryptography
Data security
Information security
Intelligent networks
Military computing
title Key management in wireless ad hoc networks: collusion analysis and prevention
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T03%3A34%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Key%20management%20in%20wireless%20ad%20hoc%20networks:%20collusion%20analysis%20and%20prevention&rft.btitle=PCCC%202005.%2024th%20IEEE%20International%20Performance,%20Computing,%20and%20Communications%20Conference,%202005&rft.au=Younis,%20M.&rft.date=2005&rft.spage=199&rft.epage=203&rft.pages=199-203&rft.issn=1097-2641&rft.eissn=2374-9628&rft.isbn=9780780389915&rft.isbn_list=0780389913&rft_id=info:doi/10.1109/PCCC.2005.1460553&rft_dat=%3Cieee_6IE%3E1460553%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1460553&rfr_iscdi=true