skip to main content
10.1145/1023756.1023777acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

State based key hop protocol: a lightweight security protocol for wireless networks

Published: 04 October 2004 Publication History

Abstract

State Based Key Hop (SBKH) protocol provides a strong, lightweight encryption scheme for battery operated devices, such as the sensors in a wireless sensor network, as well as small office home office (SOHO) users. Although SBKH can be applied to many underlying protocols, in this paper, we focus on integrating SBKH with 802.11. Hence we compare SBKH with other 802.11 security protocols and show that SBKH eliminates all the issues with wired equivalent privacy (WEP) protocol, using the existing hardware and software as much as possible at a power and processing cost that is much lower than WiFi Protected Access (WPA) 1.0 or 2.0, and is cheaper than WE.

References

[1]
Draft Amendment to STANDARD FOR Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: MAC Security Enhancements, IEEE Std. 802.11i/D7.0, Oct. 2003.]]
[2]
Telecommunications and Information Exchange Between Systems - Local and Metropolitan Networks - MAC and PHY Control, IEEE Press 1999.]]
[3]
IEEE Standard for Local and metropolitan area networks - Port-Based Network Access Control, Oct. 2001.]]
[4]
Fluhrer S. and McGrew D. Statistical Analysis of the Alleged RC4 Keystream Generator, FSE: Fast Software Encryption, FSE2000, Springer-Verlag, 2000.]]
[5]
Fluhrer S., Mantin I., Shamir I., Weaknesses in the key scheduling algorithm of RC4, SAC'2001, 2001.]]
[6]
Mantin I., Analysis of the Stream Cipher RC4. Weizmann Institute of Science, Nov. 2001.]]
[7]
Moskowitz R., Simple Secrets/Simple Security, ICSA Labs, 2003.]]
[8]
Prasithsangaree P., Krishnamurthi P., Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs, Global Telecommns. Conf., Globecom '03, Dec. 2003.]]
[9]
Srinivasan K., Michell S., State Based Key Hop (SBKH) Protocol, Wireless 2004 Conference, Jul. 2004.]]
[10]
Srinivasan K., Michell S., Performance of State Based Key Hop (SBKH) Protocol for Security on Wireless Networks, IEEE Vehicular Technology Conference 2004 Fall, Sep. 2004.]]
[11]
Stubblefield A., Ioannidis J., and Rubin A. D., Using the Fluhrer, Mantin, and Shamir Attack to Break WEP, AT&T Labs Technical Report TD-4ZCPZZ, Aug. 2001.]]
[12]
The SPIN Model Checker: Primer and Reference Manual, Addison Wesley, 2003.]]
[13]
Walker J., 802.11 Security Series - Part II: The Temporal Key Integrity Protocol (TKIP), Intel Corporation, 2002.]]

Cited By

View all

Index Terms

  1. State based key hop protocol: a lightweight security protocol for wireless networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      PE-WASUN '04: Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
      October 2004
      136 pages
      ISBN:1581139594
      DOI:10.1145/1023756
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 October 2004

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. computer network security
      2. low power security
      3. state based encryption
      4. wireless security
      5. wireless sensor network security

      Qualifiers

      • Article

      Conference

      MSWiM04
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 70 of 240 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 28 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)A Modified IEEE 802.11 Protocol for Increasing Confidentiality in WLANsInnovations in Bio-Inspired Computing and Applications10.1007/978-3-030-16681-6_25(247-256)Online publication date: 21-May-2019
      • (2016)A new and fast cryptographic hash function based on RC4Cryptologia10.1080/01611194.2015.113548640:6(522-540)Online publication date: 1-Nov-2016
      • (2013)Using RC4-BHF to Construct One-way Hash ChainsComputer Engineering and Networking10.1007/978-3-319-01766-2_129(1133-1141)Online publication date: 5-Dec-2013
      • (2011)RC4 state and its applications2011 Ninth Annual International Conference on Privacy, Security and Trust10.1109/PST.2011.5971993(264-269)Online publication date: Jul-2011
      • (2011)Using Concepts in Grid Data OrganizationAdvanced Research on Computer Education, Simulation and Modeling10.1007/978-3-642-21783-8_73(447-452)Online publication date: 2011
      • (2010)A Counter Disassociation Mechanism (CDM) for Wireless LANs and its Performance Simulation AnalysisIEEE Systems Journal10.1109/JSYST.2009.20398874:1(57-64)Online publication date: Mar-2010
      • (2010)An RC4-based hash function for ultra-low power devices2010 2nd International Conference on Computer Engineering and Technology10.1109/ICCET.2010.5486127(V1-323-V1-328)Online publication date: Apr-2010
      • (2009)Secure Broadcast in Wireless Sensor NetworksProceedings of the 2009 Third International Conference on Sensor Technologies and Applications10.1109/SENSORCOMM.2009.70(424-429)Online publication date: 18-Jun-2009
      • (2009)A new counter disassociation mechanism (CDM) for 802.11b/g wireless local area networks2009 IEEE/ACS International Conference on Computer Systems and Applications10.1109/AICCSA.2009.5069333(251-259)Online publication date: May-2009
      • (2009)A lightweight secure data transmission protocol for resource constrained devicesSecurity and Communication Networks10.1002/sec.1403:5(362-370)Online publication date: 15-Sep-2009
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media