DocumentCode
2298548
Title
A Novel Relay Encryption Scheme for Mobile Ad hoc Networks
Author
Hu, Duan ; Wang, Furong ; Huang, Chen ; Rong, Chunming
Author_Institution
Sch. of Software Eng., Huazhong Univ. of Sci. & Technol., Wuhan, China
fYear
2009
fDate
7-9 July 2009
Firstpage
417
Lastpage
422
Abstract
Security has become a primary concern for providing communication in mobile ad hoc networks(MANET). Compared with a fixed network, a MANET is more vulnerable to attacks such as passive eavesdropping, data tampering and so on, so it is necessary to encrypt transmitted data to ensure its confidentiality. However, in a resource-constrained MANET, the mobile devices have limited capabilities in computation, storage and power, a single source node can not afford the whole encryption task. In this paper, we propose a relay encryption scheme based on threshold secret sharing algorithm, to enhance the data confidentiality, reliability and integrality in MANET. The basic idea is to distribute the whole encryption task to all nodes along the route, every node completes part of the encryption task instead of the single source node encrypting the whole data. In the relay encryption scheme, we divide the whole data into N shares by (T,N) threshold secret sharing algorithm. On the routing path, every node chooses several unencrypted shares and encrypts them separately. With the appropriate value of (T,N) and allocation principle for the number of shares encrypted on each node along the route, the relay encryption scheme can effectively alleviate the burden of the source node and reduce the transmission delay, meanwhile it provides a high level of security, and also improves the reliability of MANET.
Keywords
ad hoc networks; cryptography; mobile radio; telecommunication network reliability; telecommunication network routing; telecommunication security; allocation principle; data security; mobile ad hoc network; mobile devices; relay encryption scheme; resource-constrained MANET reliability; routing path; threshold secret sharing algorithm; Communication system security; Computer networks; Conferences; Cryptography; Data security; Delay effects; Mobile ad hoc networks; Mobile computing; Relays; Routing; Ad hoc networks; relay encryption; security; threshold secret sharing;
fLanguage
English
Publisher
ieee
Conference_Titel
Ubiquitous, Autonomic and Trusted Computing, 2009. UIC-ATC '09. Symposia and Workshops on
Conference_Location
Brisbane, QLD
Print_ISBN
978-1-4244-4902-6
Electronic_ISBN
978-0-7695-3737-5
Type
conf
DOI
10.1109/UIC-ATC.2009.53
Filename
5319202
Link To Document