ABSTRACT
Many distributed systems assume participants are both performant and secure, characteristics offered by many cloud-based systems. However, scaling distributed techniques down to highly resource-or power-constrained contexts may require alternative approaches. One such context is the deployment of ad hoc distributed systems in insecure or uncontrolled areas, for example during disaster response activities. Providing reliable and secure service is exacerbated by the computational and power constraints imposed on these devices. In this work, we first introduce the concept of on-demand topic-channels. Then, we describe three message authentication protocols which provide secure, authenticated communication between participants and a coordinator, while also providing resilience from adversarial or accidental disruption. We leverage homomorphic hashing primitives to trade message secrecy against communication and computational costs. Finally, we assess these protocols, and show that our hash-based protocols provide significant efficiency improvements over traditional encryption-based approaches.
- M Bellare and D Micciancio. 1997. A new paradigm for collision-free hashing: Incrementality at reduced cost. In EUROCRYPT '97. Springer. Google ScholarDigital Library
- O Delgado-Mohatar, A Fúster-Sabater, and JM Sierra. 2011. A light-weight authentication scheme for wireless sensor networks. Ad Hoc Networks (2011). Google ScholarDigital Library
- Benjamin Heintz, Abhishek Chandra, and Ramesh K Sitaraman. 2015. Optimizing grouped aggregation in geo-distributed streaming analytics. In International Symposium on High-Performance Parallel and Distributed Computing (HPDC). ACM. Google ScholarDigital Library
- Y Hu, A Perrig, and DB Johnson. 2005. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless networks 11, 1--2 (2005), 21--38. Google ScholarDigital Library
- MN Krohn, MJ Freedman, and D Mazieres. 2004. On-the-fly verification of rateless erasure codes for efficient content distribution. In Security and Privacy (S&P).Google Scholar
- Jeremy Maitin-Shepard, Mehdi Tibouchi, and Diego F Aranha. 2016. Elliptic curve multiset hash. Comput. J. 60, 4 (2016), 476--490.Google Scholar
- GCCF Pereira, RCA Alves, F Silva, RM Azevedo, BC Albertini, and CB Margi. 2017. Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems. Security and Communication Networks (2017).Google Scholar
Recommendations
Certificate-free ad hoc anonymous authentication
There is an increasing demand of ad hoc anonymous authentication (AHAA) to secure communications between ad hoc group members while preserving privacy for the members. The main obstacles in AHAA is that it is difficult to deploy traditional public-key ...
Certificateless aggregate deniable authentication protocol for ad hoc networks
Deniable authentication allows a receiver to identify the source of a given message, but cannot prove the source of a given message to any third party. It can be employed in electronic voting e-voting systems, electronic tendering e-tendering systems ...
Identity-based deniable authentication for ad hoc networks
Deniable authentication is an important security requirement for ad hoc networks. However, all known identity-based deniable authentication (IBDA) protocols are lack of formal security proof which is very important for cryptographic protocol design. In ...
Comments