• DocumentCode
    589725
  • Title

    Channel-aware key management in MANET with artificial noise forwarding

  • Author

    Dey, Hemanta ; Datta, Rohit

  • Author_Institution
    Electr. & Electron. Commun. Dept., Indian Institue of Technol., Kharagpur, Kharagpur, India
  • fYear
    2012
  • fDate
    Nov. 30 2012-Dec. 1 2012
  • Firstpage
    398
  • Lastpage
    403
  • Abstract
    Due to the dynamic configuration property and shared broadcast wireless medium in MANET, security is of much concern in this type of network. The existing resource-efficient schemes require the presence of a Trusted-Third-Party to distribute key-shares among nodes offline, or propose that the nodes should contain a set of large number of key-identifiers before forming the network. However, these schemes are not practically suitable as physical capture or betrayal of a node may expose the stored set of secret keys and key-identifiers to the attackers. In this paper we propose a channel-aware key-distribution scheme that utilizes symmetric property of wireless broadcast channels in presence of passive attackers. Our distributed scheme applies superposition property of the wireless medium to forward artificial noise towards unintended passive eavesdroppers during key-distribution among intended receiver network nodes. The scheme requires co-ordination between Key distribution centre transmitters and key-share receiving receivers, and a basic transmission infrastructure during scheduling of secret transmission. Therefore, we also propose a procedure to induce a virtual periodic infrastructure inside the MANET to monitor the network topology.
  • Keywords
    broadcast channels; mobile ad hoc networks; telecommunication network management; telecommunication network topology; telecommunication security; wireless channels; MANET; artificial noise forwarding; basic transmission infrastructure; channel-aware key management; channel-aware key-distribution scheme; dynamic configuration property; intended receiver network nodes; key-identifiers; key-share receiving receivers; key-shares; network topology; passive attackers; physical capture; resource-efficient schemes; secret keys; secret transmission; shared broadcast wireless medium; superposition property; symmetric property; trusted-third-party; unintended passive eavesdroppers; virtual periodic infrastructure; wireless broadcast channels; Communication system security; Cryptography; Mobile ad hoc networks; Noise; Wireless communication; Ad hoc network; Distributed Key Management; Distributed Security Architecture; MANET Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on
  • Conference_Location
    Kolkata
  • Print_ISBN
    978-1-4673-1828-0
  • Type

    conf

  • DOI
    10.1109/EAIT.2012.6407984
  • Filename
    6407984