Skip to main content

A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks

  • Conference paper

Abstract

Mobile ad hoc networking is an operating mode for rapid mobile node networking. Each node relies on adjacent nodes in order to achieve and maintain connectivity and functionality. Security is considered among the main issues for the successful deployment of mobile ad hoc networks (MANETs). In this paper we introduce a weak to strong authentication mechanism associated with a multiparty contributory key establishment method. The latter is designed for MANETs with dynamic changing topologies, due to continuous flow of incoming and departing nodes. We introduce a new cube algorithm based on the face-centered cubic (FCC) structure. The proposed architecture employs elliptic curve cryptography, which is considered more efficient for thin clients where processing power and energy consumption are significant constraints.

This work was supported in part by the European Commission in the 7th Framework Programme through project EU-MESH (Enhanced, Ubiquitous, and Dependable Broadband Access using MESH Networks), ICT-215320, http://www.eu-mesh.eu

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Verikoukis, C., Alonso, L., Giamalis, T.: Cross-Layer Optimization for Wireless Systems: A European Research Key Challenge. IEEE Communications Magazine 43(7), 1–3 (2005)

    Article  Google Scholar 

  2. Bonnefoi, P.-F., Sauveron, D., Park, J.H.: MANETS: an exclusive choice between use and security? Special Issue on Interactive Multimedia & Intelligent Services in Mobile and Ubiquitous Computing (MUC) of COMPUTING AND INFORMATICS 27(5) (2008)

    Google Scholar 

  3. Narayanan, A., Shmatikov, V.: Fast dictionary attacks on passwords using time-space trade-off Conference on Computer and Communications Security. In: Proceedings of the 12th ACM conference on Computer and communications security, Alexandria VA USA (2005)

    Google Scholar 

  4. Bellovin, S.M., Merrit, M.: Encrypted key exchange: Password based protocols secure against dictionary attacks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, USA (May 1992)

    Google Scholar 

  5. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  6. Cucker, F., Smale, S.: Complexity estimates depending on condition and round off error. Journal of the Association for Computing Machinery 46(1), 113–184 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  7. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 4(8), 203–209 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  8. Rivest, R., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  9. Menezes, A., Okamoto, T., Vanstone, S.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Transactions on Information Theory 39, 1639–1646 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  10. Menezes, A., Teske, E., Weng, A.: Weak Fields for ECC. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 366–386. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Johnson, D., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). International Journal on Information Security 1, 36–63 (2001)

    Article  Google Scholar 

  12. Kalele, A.A., Sule, V.R.: Weak keys of pairing based Diffie-Hellman schemes on elliptic curves. Cryptology ePrint Archive 2005/30 (2005)

    Google Scholar 

  13. Zheng, D., Chen, K., You, J.: Multiparty authentication services and key agreement protocols with semi-trusted third party. Journal of Computer Science and Technology archive 17(6), 749–756 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  14. Ateniese, G., Steiner, M., Tsudik, G.: New Multiparty Authentication Services and Key Agreement Protocols. IEEE Journal of Selected Areas in Communications 18(4) (April 2000)

    Google Scholar 

  15. Becker, C., Wille, U.: Communication complexity of group key distribution. In: 5th ACM Conference on Computer and Communications Security, San Francisco, California (November 1998)

    Google Scholar 

  16. Asokan, N., Ginzboorg, P.: Key agreement in ad hoc networks. Computer Communications 23, 1627–1637 (2000)

    Article  Google Scholar 

  17. Askoxylakis, I.G., Kastanis, D.D., Traganitis, A.P.: Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks, Communications. In: Networks and Information Security CNIS 2006, Cambridge, USA (October 2006)

    Google Scholar 

  18. Askoxylakis, I.G., Sauveron, D., Markantonakis, K., Tryfonas, T., Traganitis, A.: A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. In: Second International Conference on Emerging Security Information, Systems and Technologies, Cap Esterel, France, August 25-29, pp. 193–202 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Askoxylakis, I.G., Markantonakis, K., Tryfonas, T., May, J., Traganitis, A. (2009). A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks. In: Granelli, F., Skianis, C., Chatzimisios, P., Xiao, Y., Redana, S. (eds) Mobile Lightweight Wireless Systems. Mobilight 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 13. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03819-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03819-8_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03818-1

  • Online ISBN: 978-3-642-03819-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics