Skip to main content
Erschienen in: Wireless Personal Communications 3/2017

26.05.2017

MuGKeG: Secure Multi-channel Group Key Generation Algorithm for Wireless Networks

verfasst von: Naumana Ayub, Mamoon Raja, Saad Saleh, Muhammad U. Ilyas

Erschienen in: Wireless Personal Communications | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The broadcast nature of communication channels in infrastructureless wireless networks poses challenges to security. In this paper, we propose a novel technique namely secure multi-channel group key generation (MuGKeG) algorithm. We utilize the available channels switching behaviour between multiple nodes to hide our key from eavesdropper. We provide descriptions for an illustrative base case of three users and one eavesdropper and expand it for the case of N users with C channels and M eavesdroppers. Repeated application of the MuGKeG algorithm on the order of \(O(\log {N})\) allows scaling the size of the group in the order of millions. We provide an analytical closed-form solution for the entropy of the secret group key generated when eavesdroppers follow an optimal attack strategy, and verify it by ns-3 simulations. Comparison with previous state-of-the-art schemes suggests that MuGKeG can provide upto 20 kbps increase in secrecy rate with a scalable key size.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Arora, A., & Sang, L. (2009). Dialog codes for secure wireless communications. In Proceedings of the IPSN conference. Arora, A., & Sang, L. (2009). Dialog codes for secure wireless communications. In Proceedings of the IPSN conference.
2.
Zurück zum Zitat Basilico, N., Gatti, N., Monga, M., & Sicari, S. (2014). Security games for node localization through verifiable multilateration. IEEE Transactions on Dependable and Secure Computing, 11(1), 72–85.CrossRef Basilico, N., Gatti, N., Monga, M., & Sicari, S. (2014). Security games for node localization through verifiable multilateration. IEEE Transactions on Dependable and Secure Computing, 11(1), 72–85.CrossRef
3.
Zurück zum Zitat Cover, T. M., & Thomas, J. A. (2012). Elements of information theory. London: Wiley.MATH Cover, T. M., & Thomas, J. A. (2012). Elements of information theory. London: Wiley.MATH
4.
Zurück zum Zitat Croft, J., Patwari, N., & Kasera, S. K. (2010). Robust uncorrelated bit extraction methodologies for wireless sensors. In Proceedings of the IPSN conference. Croft, J., Patwari, N., & Kasera, S. K. (2010). Robust uncorrelated bit extraction methodologies for wireless sensors. In Proceedings of the IPSN conference.
5.
Zurück zum Zitat Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.MathSciNetCrossRef Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.MathSciNetCrossRef
6.
Zurück zum Zitat Gollakota, S., & Katabi, D. (2011). Physical layer wireless security made fast and channel independent. In Proceedings of the IEEE international conference on computer communications (INFOCOM). Gollakota, S., & Katabi, D. (2011). Physical layer wireless security made fast and channel independent. In Proceedings of the IEEE international conference on computer communications (INFOCOM).
7.
Zurück zum Zitat Henderson, T. R., Lacage, M., Riley, G. F., Dowell, C., & Kopena, J. (2008). Network simulations with the ns-3 simulator. In SIGCOMM demonstration. Henderson, T. R., Lacage, M., Riley, G. F., Dowell, C., & Kopena, J. (2008). Network simulations with the ns-3 simulator. In SIGCOMM demonstration.
8.
Zurück zum Zitat Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X., & Chen, D. (2013). OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In Proceedings of the IEEE international conference on computer communications (INFOCOM) (pp. 2274–2282). Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X., & Chen, D. (2013). OPFKA: Secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In Proceedings of the IEEE international conference on computer communications (INFOCOM) (pp. 2274–2282).
9.
Zurück zum Zitat Jana, S., Premnath, S. N., Clark, M., Kasera, S. K., Patwari, N., & Krishnamurthy, S. V. (2009). On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the ACM MOBICOM conference. Jana, S., Premnath, S. N., Clark, M., Kasera, S. K., Patwari, N., & Krishnamurthy, S. V. (2009). On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the ACM MOBICOM conference.
10.
Zurück zum Zitat Liu, H., Wang, Y., Yang, J., & Chen, Y. (2013). Fast and practical secret key extraction by exploiting channel response. In Proceedings of the IEEE international conference on computer communications (INFOCOM) (pp. 3048–3056). Liu, H., Wang, Y., Yang, J., & Chen, Y. (2013). Fast and practical secret key extraction by exploiting channel response. In Proceedings of the IEEE international conference on computer communications (INFOCOM) (pp. 3048–3056).
11.
Zurück zum Zitat Miller, M. J., & Vaidya, N. H. (2006). Leveraging channel diversity for key establishment in wireless sensor networks. In Proceedings of the IEEE international conference on computer communications (INFOCOM). Miller, M. J., & Vaidya, N. H. (2006). Leveraging channel diversity for key establishment in wireless sensor networks. In Proceedings of the IEEE international conference on computer communications (INFOCOM).
12.
Zurück zum Zitat The Associated Press. (2007). TJX says theft of credit data involved 45.7 million cards. New York: The New York Times. The Associated Press. (2007). TJX says theft of credit data involved 45.7 million cards. New York: The New York Times.
13.
Zurück zum Zitat Safaka, I., Fragouli, C., Argyraki, K., & Diggavi, S. (2012). Creating shared secrets out of thin air. In Proceedings of the 11th ACM workshop on hot topics in networks (pp. 73–78). ACM. Safaka, I., Fragouli, C., Argyraki, K., & Diggavi, S. (2012). Creating shared secrets out of thin air. In Proceedings of the 11th ACM workshop on hot topics in networks (pp. 73–78). ACM.
14.
Zurück zum Zitat Safaka, I., Fragouli, C., Argyraki, K., & Diggavi, S. (2013). Exchanging pairwise secrets efficiently. In Proceedings of the IEEE international conference on computer communications (INFOCOM) (pp. 2265–2273). Safaka, I., Fragouli, C., Argyraki, K., & Diggavi, S. (2013). Exchanging pairwise secrets efficiently. In Proceedings of the IEEE international conference on computer communications (INFOCOM) (pp. 2265–2273).
15.
Zurück zum Zitat Sankararaman, S., Abu-Affash, K., Efrat, A., Eriksson-Bique, S.D., Polishchuk, V., Ramasubramanian, S., et al. (2012). Optimization schemes for protective jamming. In Proceedings of the ACM international symposium on mobile ad hoc networking and computing (pp. 65–74). Sankararaman, S., Abu-Affash, K., Efrat, A., Eriksson-Bique, S.D., Polishchuk, V., Ramasubramanian, S., et al. (2012). Optimization schemes for protective jamming. In Proceedings of the ACM international symposium on mobile ad hoc networking and computing (pp. 65–74).
16.
Zurück zum Zitat Singh, S. (1999). The code book: The science of secrecy from ancient Egypt to quantum cryptography. Anchor books. EDICION, ISBN 744962333. Singh, S. (1999). The code book: The science of secrecy from ancient Egypt to quantum cryptography. Anchor books. EDICION, ISBN 744962333.
17.
Zurück zum Zitat Tanenbaum, A. S. (1989). Computer networks (Vol. 1981). Englewood Cliffs, NY: Prentice-Hall.MATH Tanenbaum, A. S. (1989). Computer networks (Vol. 1981). Englewood Cliffs, NY: Prentice-Hall.MATH
18.
Zurück zum Zitat Tsai, S. C., Tzeng, W. G., & Zhou, K. Y. (2009). Key establishment schemes against storage-bounded adversaries in wireless sensor networks. IEEE Transactions on Wireless Communications, 8, 1218–1222.CrossRef Tsai, S. C., Tzeng, W. G., & Zhou, K. Y. (2009). Key establishment schemes against storage-bounded adversaries in wireless sensor networks. IEEE Transactions on Wireless Communications, 8, 1218–1222.CrossRef
19.
Zurück zum Zitat Vasudevan, S., Goeckel, D., & Towsley, D. (2010). Security-capacity trade-off in large wireless networks using keyless secrecy. In Proceedings of the eleventh ACM international symposium on mobile ad hoc networking and computing (MobiHoc). Vasudevan, S., Goeckel, D., & Towsley, D. (2010). Security-capacity trade-off in large wireless networks using keyless secrecy. In Proceedings of the eleventh ACM international symposium on mobile ad hoc networking and computing (MobiHoc).
20.
Zurück zum Zitat Wang, Q., Su, H., Ren, K., & Kim, K. (2011). Fast and scable secret key generation exploiting channel phase randomness in wireless networks. In Proceedings of the IEEE international conference on computer communications (INFOCOM). Wang, Q., Su, H., Ren, K., & Kim, K. (2011). Fast and scable secret key generation exploiting channel phase randomness in wireless networks. In Proceedings of the IEEE international conference on computer communications (INFOCOM).
21.
Zurück zum Zitat Xiao, S., Gong, W., & Towsley, D. (2010). Secure wireless communication with dynamic secrets. In Proceedings of the IEEE international conference on computer communications (INFOCOM). Xiao, S., Gong, W., & Towsley, D. (2010). Secure wireless communication with dynamic secrets. In Proceedings of the IEEE international conference on computer communications (INFOCOM).
22.
Zurück zum Zitat Zan, B., & Gruteser, M. (2009). Random channel hopping schemes for key agreement in wireless networks. In IEEE international symposium on personal, indoor and mobile radio communications. Zan, B., & Gruteser, M. (2009). Random channel hopping schemes for key agreement in wireless networks. In IEEE international symposium on personal, indoor and mobile radio communications.
23.
Zurück zum Zitat Zhu, X., Xu, F., Novak, E., Tan, C. C., Li, Q., & Chen, G. (2013). Extracting secret key from wireless link dynamics in vehicular environments. In Proceedings of the IEEE international conference on computer communications (INFOCOM) (pp. 2283–2291). IEEE. Zhu, X., Xu, F., Novak, E., Tan, C. C., Li, Q., & Chen, G. (2013). Extracting secret key from wireless link dynamics in vehicular environments. In Proceedings of the IEEE international conference on computer communications (INFOCOM) (pp. 2283–2291). IEEE.
Metadaten
Titel
MuGKeG: Secure Multi-channel Group Key Generation Algorithm for Wireless Networks
verfasst von
Naumana Ayub
Mamoon Raja
Saad Saleh
Muhammad U. Ilyas
Publikationsdatum
26.05.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4423-9

Weitere Artikel der Ausgabe 3/2017

Wireless Personal Communications 3/2017 Zur Ausgabe

Neuer Inhalt