Skip to main content
Erschienen in: Wireless Networks 4/2015

01.05.2015

Multi-party encryption (MPE): secure communications in delay tolerant networks

verfasst von: Roy Cabaniss, Vimal Kumar, Sanjay Madria

Erschienen in: Wireless Networks | Ausgabe 4/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile ad hoc networks are a subset of delay tolerant networks (DTNs) composed of several mobile devices. These dynamic environments make conventional security algorithms unreliable; nodes located far apart from each other may not have access (available) to each other’s public keys or have doubt on the validity of public-keys, making secure message exchange difficult. Furthermore, ad hoc networks are likely to be highly compromised and therefore may be untrusted. Other security methods, such as identity-based encryption and Kerberos, rely on requesting key data from a trusted third party, which can be unavailable or compromised in a DTN like environment. The purpose of this paper is to introduce two security overlay networks capable of delivering messages securely, preventing both eavesdropping and alteration of messages. The first algorithm, Chaining, uses multiple midpoints to re-encrypt the message for the destination node. The second, Fragmenting, separates the message key into pieces that are routed and secured independently from each other. Both techniques improve security in hostile environments; under test conditions, Chaining reduces the number of messages intercepted by 90 %, and Fragmenting by 83 %. This improvement has a performance trade-off, however, reducing the delivery ratio by 63 % in both algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The costs of encrypting the message are negligible compared to the transmission costs. During experiments with Mica2 nodes, for example, encrypting a 1 kB message required 12.96 μJ. Transmitting the message required 1.5 mJ.
 
Literatur
1.
Zurück zum Zitat Al-Shurman, M., Yoo, S.-M., & Park, S. (2004). Black hole attack in mobile ad hoc networks. In ACM Southeast regional conference (pp. 96–97). Al-Shurman, M., Yoo, S.-M., & Park, S. (2004). Black hole attack in mobile ad hoc networks. In ACM Southeast regional conference (pp. 96–97).
2.
Zurück zum Zitat Bhutta, N., Ansa, G., Johnson, E., Ahmad, N., Alsiyabi, M., & Cruickshank, H. (2009). Security analysis for delay/disruption tolerant satellite and sensor networks. In International workshop on satellite and space communications, 2009. IWSSC 2009 (pp. 385–389). Bhutta, N., Ansa, G., Johnson, E., Ahmad, N., Alsiyabi, M., & Cruickshank, H. (2009). Security analysis for delay/disruption tolerant satellite and sensor networks. In International workshop on satellite and space communications, 2009. IWSSC 2009 (pp. 385–389).
3.
Zurück zum Zitat Cabaniss, R., Kumar, V., & Madria, S. (2012). Three point encryption (3PE): Secure communications in delay tolerant networks. In SRDS. IEEE (pp. 479–480). Cabaniss, R., Kumar, V., & Madria, S. (2012). Three point encryption (3PE): Secure communications in delay tolerant networks. In SRDS. IEEE (pp. 479–480).
4.
Zurück zum Zitat Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey. Technical report. Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey. Technical report.
5.
Zurück zum Zitat Capkun, S., Buttyn, L., & Hubaux, J.-P. (2002). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2, 52–64.CrossRef Capkun, S., Buttyn, L., & Hubaux, J.-P. (2002). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2, 52–64.CrossRef
6.
Zurück zum Zitat Dimitriou, T., & Michalas, A. (2014). Multi-party trust computation in decentralized environments in the presence of malicious adversaries. Ad Hoc Networks, 15, 53–66 (Smart solutions for mobility supported distributed and embedded systems). Dimitriou, T., & Michalas, A. (2014). Multi-party trust computation in decentralized environments in the presence of malicious adversaries. Ad Hoc Networks, 15, 53–66 (Smart solutions for mobility supported distributed and embedded systems).
7.
Zurück zum Zitat Dolev, S., Gilboa, N., & Kopeetsky, M. (2014). Efficient private multi-party computations of trust in the presence of curious and malicious users. Journal of Trust Management, 1, 8. doi:10.1186/2196-064X-1-8. Dolev, S., Gilboa, N., & Kopeetsky, M. (2014). Efficient private multi-party computations of trust in the presence of curious and malicious users. Journal of Trust Management, 1, 8. doi:10.​1186/​2196-064X-1-8.
8.
Zurück zum Zitat El Defrawy, K., Solis, J., & Tsudik, G. (2009). Leveraging social contacts for message confidentiality in delay tolerant networks. In 2009 33rd annual IEEE international computer software and applications conference. IEEE (pp. 271–279). El Defrawy, K., Solis, J., & Tsudik, G. (2009). Leveraging social contacts for message confidentiality in delay tolerant networks. In 2009 33rd annual IEEE international computer software and applications conference. IEEE (pp. 271–279).
9.
Zurück zum Zitat Golle, P., Jakobsson, M., Juels, A., & Syverson, P. (2002). Universal re-encryption for mixnets. In RSA conference, cryptographer’s track (pp. 163–178). Springer. Golle, P., Jakobsson, M., Juels, A., & Syverson, P. (2002). Universal re-encryption for mixnets. In RSA conference, cryptographer’s track (pp. 163–178). Springer.
10.
Zurück zum Zitat Jain, M., & Kandwal, H. (2009). A survey on complex wormhole attack in wireless ad hoc networks. In International conference on advances in computing, control, and telecommunication technologies (Washington, DC, USA, 2009), ACT’09 (pp. 555–558). IEEE Computer Society. Jain, M., & Kandwal, H. (2009). A survey on complex wormhole attack in wireless ad hoc networks. In International conference on advances in computing, control, and telecommunication technologies (Washington, DC, USA, 2009), ACT’09 (pp. 555–558). IEEE Computer Society.
11.
Zurück zum Zitat Katz, J., & Yung, M. (2001). Threshold cryptosystems based on factoring. Cryptology ePrint Archive, Report 2001/093. Katz, J., & Yung, M. (2001). Threshold cryptosystems based on factoring. Cryptology ePrint Archive, Report 2001/093.
12.
Zurück zum Zitat Kong, J., Zerfos, P., Luo, H., Lu, S., & Zhang, L. (2001). Providing robust and ubiquitous security support for manet. In Proceedings of IEEE international conference on network protocols (ICNP). Kong, J., Zerfos, P., Luo, H., Lu, S., & Zhang, L. (2001). Providing robust and ubiquitous security support for manet. In Proceedings of IEEE international conference on network protocols (ICNP).
13.
Zurück zum Zitat Kong, Y., Deng, J., & Tate, S. R. (2010). A distributed public key caching scheme in large wireless networks. In Proceedings of IEEE global telecommunications conference—communication and information system security (GLOBECOM’10). Miami, FL, USA, December 6–10 2010. Kong, Y., Deng, J., & Tate, S. R. (2010). A distributed public key caching scheme in large wireless networks. In Proceedings of IEEE global telecommunications conference—communication and information system security (GLOBECOM’10). Miami, FL, USA, December 6–10 2010.
14.
Zurück zum Zitat Kosta, S., Mei, A., & Stefa, J. (2010). Small world in motion (SWIM): Modeling communities in ad-hoc mobile networking. In Proceedings of the seventh annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks, SECON 2010 (pp. 10–18). June 21–25, 2010, Boston, Massachusetts, USA. Kosta, S., Mei, A., & Stefa, J. (2010). Small world in motion (SWIM): Modeling communities in ad-hoc mobile networking. In Proceedings of the seventh annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks, SECON 2010 (pp. 10–18). June 21–25, 2010, Boston, Massachusetts, USA.
15.
Zurück zum Zitat Levine, B. N., Shields, C., & Margolin, N. B. (2006). A survey of solutions to the sybil attack. Technical report 2006–052, University of Massachusetts Amherst, Amherst, MA, October 2006. Levine, B. N., Shields, C., & Margolin, N. B. (2006). A survey of solutions to the sybil attack. Technical report 2006–052, University of Massachusetts Amherst, Amherst, MA, October 2006.
16.
Zurück zum Zitat Lewand, R. E. (2000). Cryptological mathematics (classroom resource materials). Washington, DC: The Mathematical Association of America. Lewand, R. E. (2000). Cryptological mathematics (classroom resource materials). Washington, DC: The Mathematical Association of America.
17.
Zurück zum Zitat Lindgren, A., Doria, A., & Schelén, O. (2003). Probabilistic routing in intermittently connected networks. SIGMOBILE Mobile Computing and Communications Review, 7, 19–20.CrossRef Lindgren, A., Doria, A., & Schelén, O. (2003). Probabilistic routing in intermittently connected networks. SIGMOBILE Mobile Computing and Communications Review, 7, 19–20.CrossRef
18.
Zurück zum Zitat Madria, S. K., & Yin, J. (2009). Serwa: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Networks, 7(6), 1051–1063.CrossRef Madria, S. K., & Yin, J. (2009). Serwa: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Networks, 7(6), 1051–1063.CrossRef
19.
Zurück zum Zitat Menezes, A., & Ustaoglu, B. (2006). On the importance of public-key validation in the mqv and hmqv key agreement protocols. In Proceedings of the 7th international conference on cryptology in India (Berlin, Heidelberg, 2006), INDOCRYPT’06 (pp. 133–147). Springer. Menezes, A., & Ustaoglu, B. (2006). On the importance of public-key validation in the mqv and hmqv key agreement protocols. In Proceedings of the 7th international conference on cryptology in India (Berlin, Heidelberg, 2006), INDOCRYPT’06 (pp. 133–147). Springer.
20.
Zurück zum Zitat Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: Analysis defenses. In Third international symposium on information processing in sensor networks, 2004. IPSN 2004 (pp. 259–268). Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: Analysis defenses. In Third international symposium on information processing in sensor networks, 2004. IPSN 2004 (pp. 259–268).
21.
Zurück zum Zitat Patra, R., Surana, S., & Nedevschi, S. (2008). Hierarchical identity based cryptography for end-to-end security in dtns. In 4th international conference on intelligent computer communication and processing, 2008. ICCP 2008 (pp. 223–230). Patra, R., Surana, S., & Nedevschi, S. (2008). Hierarchical identity based cryptography for end-to-end security in dtns. In 4th international conference on intelligent computer communication and processing, 2008. ICCP 2008 (pp. 223–230).
23.
Zurück zum Zitat Stajano, F., & Anderson, R. (1999). The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of 7th International Workshop on Security Protocols, Cambridge. Picture Notes in Computer Science (Vol. 1796, pp. 172–194). Berlin: Springer. Stajano, F., & Anderson, R. (1999). The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of 7th International Workshop on Security Protocols, Cambridge. Picture Notes in Computer Science (Vol. 1796, pp. 172–194). Berlin: Springer.
24.
Zurück zum Zitat Stinson, D. R. (2005). Cryptography: theory and practice, third edition (discrete mathematics and its applications). Boca Raton: Chapman & Hall/CRC. Stinson, D. R. (2005). Cryptography: theory and practice, third edition (discrete mathematics and its applications).  Boca Raton: Chapman & Hall/CRC.
25.
Zurück zum Zitat Syverson, P. F., Reed, M. G., & Goldschlag, D. M. (1997). Private web browsing. Journal of Computer Security, 5(3), 237–248. Syverson, P. F., Reed, M. G., & Goldschlag, D. M. (1997). Private web browsing. Journal of Computer Security, 5(3), 237–248.
26.
Zurück zum Zitat Vakde, G., Bibikar, R., Le, Z., & Wright, M. (2011). Enpassant: Anonymous routing for disruption-tolerant networks with applications in assistive environments. Security and Communication Networks, 4(11), 1243–1256.CrossRef Vakde, G., Bibikar, R., Le, Z., & Wright, M. (2011). Enpassant: Anonymous routing for disruption-tolerant networks with applications in assistive environments. Security and Communication Networks, 4(11), 1243–1256.CrossRef
27.
Zurück zum Zitat Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Y. Xiao , X. S. Shen & D.-Z. Du (Eds.), Wireless network security, signals and communication technology (pp. 103–135). US: Springer. Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. In Y. Xiao , X. S. Shen & D.-Z. Du (Eds.), Wireless network security, signals and communication technology (pp. 103–135). US: Springer.
28.
Zurück zum Zitat Yin, J., & Madria, S. K. (2006). A hierarchical secure routing protocol against black hole attacks in sensor networks. In SUTC (1) (pp. 376–383). Yin, J., & Madria, S. K. (2006). A hierarchical secure routing protocol against black hole attacks in sensor networks. In SUTC (1) (pp. 376–383).
29.
Zurück zum Zitat Zhou, L., & Haas, Z. J. (1999). Securing ad hoc networks. IEEE Network Magazine, 13, 24–30.CrossRef Zhou, L., & Haas, Z. J. (1999). Securing ad hoc networks. IEEE Network Magazine, 13, 24–30.CrossRef
Metadaten
Titel
Multi-party encryption (MPE): secure communications in delay tolerant networks
verfasst von
Roy Cabaniss
Vimal Kumar
Sanjay Madria
Publikationsdatum
01.05.2015
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 4/2015
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-014-0848-1

Weitere Artikel der Ausgabe 4/2015

Wireless Networks 4/2015 Zur Ausgabe

Neuer Inhalt