Title :
Energy-Efficient Group Key Agreement for Wireless Networks
Author :
Halford, Thomas R. ; Courtade, Thomas A. ; Chugg, Keith M. ; Xiaochen Li ; Thatte, Gautam
Author_Institution :
TrellisWare Technol., Inc., San Diego, CA, USA
Abstract :
Advances in lattice-based cryptography are enabling the use of public key algorithms (PKAs) in power-constrained ad hoc and sensor network devices. Unfortunately, while many wireless networks are dominated by group communications, PKAs are inherently unicast-i.e., public/private key pairs are generated by data destinations. To fully realize public key cryptography in these networks, lightweight PKAs should be augmented with energy-efficient mechanisms for group key agreement. We consider a setting where master keys are loaded on clients according to an arbitrary distribution. We present a protocol that uses session keys derived from those master keys to establish a group key that is information-theoretically secure. When master keys are distributed randomly, our protocol requires O(logb t) multicasts, where 1-1 is the probability that a given client possesses a given master key. The minimum number of public multicast transmissions required for a set of clients to agree on a secret key in our setting was recently characterized. The proposed protocol achieves the best possible approximation to that optimum that is computable in polynomial time. Moreover, the computational requirements of our protocol compare favorably to multi-party extensions of Diffie-Hellman key exchange.
Keywords :
ad hoc networks; approximation theory; computational complexity; cryptographic protocols; multicast protocols; private key cryptography; probability; public key cryptography; telecommunication security; wireless sensor networks; Diffie-Hellman key exchange; computational requirements; data destinations; energy-efficient group key agreement; energy-efficient mechanisms; group communications; group key agreement; lattice-based cryptography; polynomial time; power-constrained ad hoc network devices; power-constrained sensor network devices; private key pair generation; probability; public key algorithms; public key pair generation; public multicast transmissions; session keys; wireless networks; Approximation methods; Encoding; Polynomials; Protocols; Security; Wireless networks; Ad hoc wireless networks; public key cryptography; wireless sensor networks;
Journal_Title :
Wireless Communications, IEEE Transactions on
DOI :
10.1109/TWC.2015.2439675