• DocumentCode
    653777
  • Title

    Energy-efficient, secure group key agreement for ad hoc networks

  • Author

    Halford, Thomas R. ; Courtade, Thomas A. ; Chugg, K.M.

  • Author_Institution
    TrellisWare Technol., Inc., San Diego, CA, USA
  • fYear
    2013
  • fDate
    14-16 Oct. 2013
  • Firstpage
    181
  • Lastpage
    188
  • Abstract
    Public key cryptography is well-suited to ad hoc networks as it requires no a priori secure key distribution mechanism. Recent advances in lattice-based cryptography are enabling the use of public key algorithms (PKAs) in low-power devices. Unfortunately, while many ad hoc networking applications are dominated by multicast traffic, PKAs are inherently unicast: public/private key pairs are generated by data destinations. To fully realize public key cryptography in ad hoc networks, low-power PKAs must therefore be augmented with energy-efficient mechanisms for secure group key establishment. Motivated by recent results on information theoretic secrecy, we present a protocol that generates keys for t-sized multicast groups with O(logbt) transmissions, where b is a parameter that enables trades between energy efficiency and security. Extensions of this protocol that exploit network topology side information and which permit multilevel security are also described. A cryptosystem employing an energy-efficient PKA and the protocols presented herein could provide the benefits of public key cryptography - i.e., dynamic ad hoc network support - with features currently found only in symmetric systems.
  • Keywords
    ad hoc networks; multicast communication; public key cryptography; topology; O(logbt) transmissions; PKA; a priori secure key distribution mechanism; ad hoc networks; energy-efficient secure group key agreement; information theoretic secrecy; lattice-based cryptography; multicast traffic; network topology side information; public key algorithms; public key cryptography; secure group key establishment; t-sized multicast groups; Ad hoc networks; Conferences; Cryptography; Doping; Heuristic algorithms; Protocols;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Network Security (CNS), 2013 IEEE Conference on
  • Conference_Location
    National Harbor, MD
  • Type

    conf

  • DOI
    10.1109/CNS.2013.6682706
  • Filename
    6682706