首页> 外文会议>Computer security-ESORICS 2008 >Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs
【24h】

Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs

机译:MANET中的高弹性且非交互性的分层密钥协议

获取原文
获取原文并翻译 | 示例

摘要

Key agreement is a fundamental security functionality by which pairs of nodes agree on shared keys to be used for protecting their pairwise communications. In this work we study key-agreement schemes that are well-suited for the mobile network environment. Specifically, we describe schemes with the following characteristics:rn1. Non-interactive: any two nodes can compute a unique shared secret key without interaction;rn2. Identity-based: to compute the shared secret key, each node only needs its own secret key and the identity of its peer;rn3. Hierarchical: the scheme is decentralized through a hierarchy where intermediate nodes in the hierarchy can derive the secret keys for each of its children without any limitations or prior knowledge on the number of such children or their identities;rn4. Resilient: the scheme is fully resilient against compromise of any number of leaves in the hierarchy, and of a threshold number of nodes in each of the upper levels of the hierarchy.rnSeveral schemes in the literature have three of these four properties, but the schemes in this work are the first to possess all four. This makes them well-suited for environments such as MANETs and tactical networks which are very dynamic, have significant bandwidth and energy constraints, and where many nodes are vulnerable to compromise. We provide rigorous analysis of the proposed schemes and discuss implementations aspects.
机译:密钥协议是一种基本的安全功能,通过该协议,成对的节点在共享密钥上达成协议,以用于保护其成对通信。在这项工作中,我们研究了非常适合移动网络环境的密钥协商方案。具体来说,我们描述具有以下特征的方案:rn1。非交互的:任何两个节点都可以计算唯一的共享密钥而无需交互; rn2。基于身份的:要计算共享密钥,每个节点仅需要自己的密钥和对等方的身份; rn3。分层的:该方案通过层次结构进行分散,其中层次结构中的中间节点可以为其每个子级派生秘密密钥,而对这些子级或它们的标识的数量没有任何限制或先验知识; rn4。弹性:该方案具有完全的弹性,可以抵抗层次结构中任意数量的叶子以及层次结构中每个较高级别的节点数阈值的损害。rn文献中的几种方案具有这四个属性中的三个,但是这些方案在这项工作中,第一个拥有全部四个。这使得它们非常适合诸如MANET和战术网络之类的环境,这些环境非常动态,具有显着的带宽和能量约束,并且其中许多节点容易受到损害。我们对提出的方案进行严格的分析,并讨论实施方面。

著录项

  • 来源
    《Computer security-ESORICS 2008》|2008年|49-65|共17页
  • 会议地点 Malaga(ES);Malaga(ES)
  • 作者单位

    IBM, T.J. Watson Research Center Hawthorne, NY 10532, USA;

    IBM, T.J. Watson Research Center Hawthorne, NY 10532, USA;

    IBM, T.J. Watson Research Center Hawthorne, NY 10532, USA;

    IBM, T.J. Watson Research Center Hawthorne, NY 10532, USA;

    Royal Holloway, Department of Mathematics, Royal Holloway, University of London, United Kingdom;

    Royal Holloway, Department of Mathematics, Royal Holloway, University of London, United Kingdom;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 安全保密;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号