Title :
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Author :
Lan, Tian ; Lee, Ruby ; Chiang, Mung
Author_Institution :
Dept. of Electr. Eng., Princeton Univ., Princeton, NJ, USA
Abstract :
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, full key-connectivity can not be achieved by key pre-distribution. In this paper, we develop an analytical framework for the on-demand key establishment approach. We propose a novel security metric, called REM resilience vector to quantify the resilience of any key establishment schemes against Revealing, Erasure, and Modification (REM) attacks. Our analysis shows that previous key establishment schemes are vulnerable under REM attacks. Relying on the new security metric, we prove a universal bound on achievable REM resilience vectors for any on-demand key establishment scheme. This bound that characterizes the optimal security performance analytically is shown to be tight, as we propose a REM-resilient key establishment scheme which achieves any vector within this bound. In addition, we develop a class of low complexity key establishment schemes which achieve nearly-optimal REM-attack resilience.
Keywords :
ad hoc networks; telecommunication security; REM attack resilience; REM resilience vector; REM-resilient key establishment scheme; communicating node pairs; low complexity key establishment schemes; multipath key establishment; on-demand key establishment approach; optimal security performance; universal bound; wireless ad hoc networks; Ad hoc networks; Availability; Cryptography; Mobile ad hoc networks; Network servers; Performance analysis; Protection; Resilience; Scalability; Security;
Conference_Titel :
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE
Conference_Location :
Honolulu, HI
Print_ISBN :
978-1-4244-4148-8
DOI :
10.1109/GLOCOM.2009.5426213