Abstract
We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The proposed solution relies solely on symmetric cryptography and therefore is applicable for highly resource-limited devices. In order to avoid a single point of trust, no master device or base station is used. We achieve this by enhancing our previously published approach with redundancy and algorithms for recovery on device failures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wacker, A., Heiber, T., Cermann, H.: Akey-distribution scheme for wireless home automation networks. In: Proceedings of IEEE CCNC 2004, Las Vegas, Nevada, USA. IEEE Communications Society. IEEE, Los Alamitos (2004)
Anderson, R., Kuhn, M.: Tamper resistance - a cautionary note. In: Proceedings of the Second UsenixWorkshop on Electronic Commerce, pp. 1–11 (1996)
Brown, M., Cheung, D.: PGP in constrained wireless devices. In: Proceedings of the 9th USENIX Security Symposium (2000)
Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: 7th International Workshop on Security Protocols. LNCS, pp. 172–194 (1999)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (2003)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13, 24–30 (1999)
Gong, L.: Increasing availability and security of an authentication service. IEEE Journal on Selected Areas in Communications 11, 657–662 (1993)
Hubaux, J.P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), pp. 146–155 (2001)
Modadugu, N., Boneh, D., Kim, M.: Generating RSA keys on a handheld using an untrusted server. In: Cryptographer’s Track RSA Conference (2000)
Carman, D., Kruus, P., Matt, B.: Constraints and approaches for distributed sensor network security. Technical Report #00-010, NAI Labs (2000)
Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: Security protocols for sensor networks. Mobile Computing and Networking, 189–199 (2001)
Basagni, S., Herrin, K., Bruschi, D., Rosti, E.: Secure pebblenets. In: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 156–163 (2001)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS 2002), pp. 41–47 (2002)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. Technical Report ISE-TR-03-01, George Mason University (2003)
Dolev, D., Dwork, C., Waarts, O., Yung, M.: Perfectly secure message transmission. J. ACM 40, 17–47 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wacker, A., Heiber, T., Cermann, H., Marrón, P.J. (2004). A Fault-Tolerant Key-Distribution Scheme for Securing Wireless Ad Hoc Networks. In: Ferscha, A., Mattern, F. (eds) Pervasive Computing. Pervasive 2004. Lecture Notes in Computer Science, vol 3001. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24646-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-24646-6_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21835-7
Online ISBN: 978-3-540-24646-6
eBook Packages: Springer Book Archive