DocumentCode :
2298548
Title :
A Novel Relay Encryption Scheme for Mobile Ad hoc Networks
Author :
Hu, Duan ; Wang, Furong ; Huang, Chen ; Rong, Chunming
Author_Institution :
Sch. of Software Eng., Huazhong Univ. of Sci. & Technol., Wuhan, China
fYear :
2009
fDate :
7-9 July 2009
Firstpage :
417
Lastpage :
422
Abstract :
Security has become a primary concern for providing communication in mobile ad hoc networks(MANET). Compared with a fixed network, a MANET is more vulnerable to attacks such as passive eavesdropping, data tampering and so on, so it is necessary to encrypt transmitted data to ensure its confidentiality. However, in a resource-constrained MANET, the mobile devices have limited capabilities in computation, storage and power, a single source node can not afford the whole encryption task. In this paper, we propose a relay encryption scheme based on threshold secret sharing algorithm, to enhance the data confidentiality, reliability and integrality in MANET. The basic idea is to distribute the whole encryption task to all nodes along the route, every node completes part of the encryption task instead of the single source node encrypting the whole data. In the relay encryption scheme, we divide the whole data into N shares by (T,N) threshold secret sharing algorithm. On the routing path, every node chooses several unencrypted shares and encrypts them separately. With the appropriate value of (T,N) and allocation principle for the number of shares encrypted on each node along the route, the relay encryption scheme can effectively alleviate the burden of the source node and reduce the transmission delay, meanwhile it provides a high level of security, and also improves the reliability of MANET.
Keywords :
ad hoc networks; cryptography; mobile radio; telecommunication network reliability; telecommunication network routing; telecommunication security; allocation principle; data security; mobile ad hoc network; mobile devices; relay encryption scheme; resource-constrained MANET reliability; routing path; threshold secret sharing algorithm; Communication system security; Computer networks; Conferences; Cryptography; Data security; Delay effects; Mobile ad hoc networks; Mobile computing; Relays; Routing; Ad hoc networks; relay encryption; security; threshold secret sharing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Ubiquitous, Autonomic and Trusted Computing, 2009. UIC-ATC '09. Symposia and Workshops on
Conference_Location :
Brisbane, QLD
Print_ISBN :
978-1-4244-4902-6
Electronic_ISBN :
978-0-7695-3737-5
Type :
conf
DOI :
10.1109/UIC-ATC.2009.53
Filename :
5319202
Link To Document :
بازگشت