Title :
Secure Communication Trees in Ad Hoc Networks
Author :
Nikodem, Jan ; Nikodem, Maciej
Author_Institution :
Inst. of Comput. Eng., Control & Robotics, Wroclaw Univ. of Technol.
Abstract :
In this paper we examine the communication trees widely used in ad hoc networks. These trees can be used in a number of ways e.g. to route or broadcast messages and to aggregate information. In this paper we propose a new key distribution protocol for large and dynamic ad hoc networks over unreliable channel. Protocol proposed here involves broadcast exclusion based on polynomial interpolation and secret key cryptography. Proposed scheme ensures security of broadcast and one-to-one communication, message authentication and gives a possibility to verify routing information. It also ensures t-resilience which means that up to t nodes can be compromised without influencing the security
Keywords :
ad hoc networks; cryptographic protocols; cryptography; message authentication; polynomials; protocols; telecommunication security; ad hoc networks; key distribution protocol; message authentication; polynomial interpolation; secret key cryptography; secure communication trees; Ad hoc networks; Aggregates; Broadcasting; Cryptographic protocols; Cryptography; Information security; Interpolation; Message authentication; Polynomials; Routing;
Conference_Titel :
Engineering of Computer-Based Systems, 2007. ECBS '07. 14th Annual IEEE International Conference and Workshops on the
Conference_Location :
Tucson, AZ
Print_ISBN :
0-7695-2772-8
DOI :
10.1109/ECBS.2007.64