DocumentCode
589725
Title
Channel-aware key management in MANET with artificial noise forwarding
Author
Dey, Hemanta ; Datta, Rohit
Author_Institution
Electr. & Electron. Commun. Dept., Indian Institue of Technol., Kharagpur, Kharagpur, India
fYear
2012
fDate
Nov. 30 2012-Dec. 1 2012
Firstpage
398
Lastpage
403
Abstract
Due to the dynamic configuration property and shared broadcast wireless medium in MANET, security is of much concern in this type of network. The existing resource-efficient schemes require the presence of a Trusted-Third-Party to distribute key-shares among nodes offline, or propose that the nodes should contain a set of large number of key-identifiers before forming the network. However, these schemes are not practically suitable as physical capture or betrayal of a node may expose the stored set of secret keys and key-identifiers to the attackers. In this paper we propose a channel-aware key-distribution scheme that utilizes symmetric property of wireless broadcast channels in presence of passive attackers. Our distributed scheme applies superposition property of the wireless medium to forward artificial noise towards unintended passive eavesdroppers during key-distribution among intended receiver network nodes. The scheme requires co-ordination between Key distribution centre transmitters and key-share receiving receivers, and a basic transmission infrastructure during scheduling of secret transmission. Therefore, we also propose a procedure to induce a virtual periodic infrastructure inside the MANET to monitor the network topology.
Keywords
broadcast channels; mobile ad hoc networks; telecommunication network management; telecommunication network topology; telecommunication security; wireless channels; MANET; artificial noise forwarding; basic transmission infrastructure; channel-aware key management; channel-aware key-distribution scheme; dynamic configuration property; intended receiver network nodes; key-identifiers; key-share receiving receivers; key-shares; network topology; passive attackers; physical capture; resource-efficient schemes; secret keys; secret transmission; shared broadcast wireless medium; superposition property; symmetric property; trusted-third-party; unintended passive eavesdroppers; virtual periodic infrastructure; wireless broadcast channels; Communication system security; Cryptography; Mobile ad hoc networks; Noise; Wireless communication; Ad hoc network; Distributed Key Management; Distributed Security Architecture; MANET Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on
Conference_Location
Kolkata
Print_ISBN
978-1-4673-1828-0
Type
conf
DOI
10.1109/EAIT.2012.6407984
Filename
6407984
Link To Document