...
首页> 外文期刊>Ad hoc networks >Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks
【24h】

Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks

机译:基于群集的无线自组织网络中可证明安全的混合密钥协商协议

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Wireless ad hoc networks support rapid on-demand and adaptive communication among the nodes due to their self-configurable and autonomous nature and lack of fixed infrastructure. Security is a crucial factor for such systems. Since ad hoc networks rely on the collaboration principle, the issue of key distribution and efficient group key management in such networks represents two of the most important problems. We describe hybrid solutions to the problem of key distribution and key management by reflecting ad hoc networks in a topology composed of a set of clusters. To date no security proofs exist for these types of protocols. We present two dynamically efficient schemes. We show that both our hybrid schemes are provably secure in the standard model under Decision Diffie-Hellman (DDH) assumption. The proposed protocols avoid the use of a trusted third party (TTP) or a central authority, eliminating a single point of attack. We analyse the complexity of the schemes and differentiate between the two approaches based on performance in a wireless setting. In comparison with the existing cluster-based hybrid key agreement protocols, our proposed approaches individually provide better performance in terms of both communication and computation, handle dynamic events efficiently, and are supported by sound security analysis in formal security models under standard cryptographic assumptions.
机译:无线自组织网络由于其可自我配置和自治的特性并且缺乏固定的基础结构,因此支持节点之间的快速按需和自适应通信。安全是此类系统的关键因素。由于自组织网络依赖于协作原理,因此此类网络中的密钥分发和有效的组密钥管理问题代表了两个最重要的问题。我们通过在由一组集群组成的拓扑中反映自组织网络来描述密钥分配和密钥管理问题的混合解决方案。迄今为止,对于这些类型的协议还没有安全证明。我们提出两种动态有效的方案。我们证明,在Decision Diffie-Hellman(DDH)假设下,我们的两种混合方案在标准模型中都是可证明的安全性。提议的协议避免了使用受信任的第三方(TTP)或中央机构,从而消除了单点攻击。我们分析了方案的复杂性,并根据无线环境中的性能来区分这两种方法。与现有的基于群集的混合密钥协商协议相比,我们提出的方法在通信和计算方面分别提供了更好的性能,有效地处理了动态事件,并在标准密码假设下,在正式安全模型中通过完善的安全性分析得到了支持。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号