DocumentCode :
589725
Title :
Channel-aware key management in MANET with artificial noise forwarding
Author :
Dey, Hemanta ; Datta, Rohit
Author_Institution :
Electr. & Electron. Commun. Dept., Indian Institue of Technol., Kharagpur, Kharagpur, India
fYear :
2012
fDate :
Nov. 30 2012-Dec. 1 2012
Firstpage :
398
Lastpage :
403
Abstract :
Due to the dynamic configuration property and shared broadcast wireless medium in MANET, security is of much concern in this type of network. The existing resource-efficient schemes require the presence of a Trusted-Third-Party to distribute key-shares among nodes offline, or propose that the nodes should contain a set of large number of key-identifiers before forming the network. However, these schemes are not practically suitable as physical capture or betrayal of a node may expose the stored set of secret keys and key-identifiers to the attackers. In this paper we propose a channel-aware key-distribution scheme that utilizes symmetric property of wireless broadcast channels in presence of passive attackers. Our distributed scheme applies superposition property of the wireless medium to forward artificial noise towards unintended passive eavesdroppers during key-distribution among intended receiver network nodes. The scheme requires co-ordination between Key distribution centre transmitters and key-share receiving receivers, and a basic transmission infrastructure during scheduling of secret transmission. Therefore, we also propose a procedure to induce a virtual periodic infrastructure inside the MANET to monitor the network topology.
Keywords :
broadcast channels; mobile ad hoc networks; telecommunication network management; telecommunication network topology; telecommunication security; wireless channels; MANET; artificial noise forwarding; basic transmission infrastructure; channel-aware key management; channel-aware key-distribution scheme; dynamic configuration property; intended receiver network nodes; key-identifiers; key-share receiving receivers; key-shares; network topology; passive attackers; physical capture; resource-efficient schemes; secret keys; secret transmission; shared broadcast wireless medium; superposition property; symmetric property; trusted-third-party; unintended passive eavesdroppers; virtual periodic infrastructure; wireless broadcast channels; Communication system security; Cryptography; Mobile ad hoc networks; Noise; Wireless communication; Ad hoc network; Distributed Key Management; Distributed Security Architecture; MANET Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on
Conference_Location :
Kolkata
Print_ISBN :
978-1-4673-1828-0
Type :
conf
DOI :
10.1109/EAIT.2012.6407984
Filename :
6407984
Link To Document :
بازگشت