Neighborhood prediction based decentralized key management for mobile wireless networks

被引:4
|
作者
Zheng, Xiuyuan [1 ]
Chen, Yingying [1 ]
Wang, Hui [2 ]
Liu, Hongbo [1 ]
Liu, Ruilin [2 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
[2] Stevens Inst Technol, Dept Comp Sci, Hoboken, NJ 07030 USA
基金
美国国家科学基金会;
关键词
Decentralized key management; Mobile wireless networks; Neighborhood prediction; Secret sharing; Distributed storage;
D O I
10.1007/s11276-013-0540-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wireless data collected in mobile environments provides tremendous opportunities to build new applications in various domains such as Vehicular Ad Hoc Networks and mobile social networks. Storing the data decentralized in wireless devices brings major advantages over centralized ones. In this work, to facilitate effective access control of the wireless data in the distributed data storage, we propose a fully decentralized key management framework by utilizing a cryptography-based secret sharing method. The secret sharing method splits the keys into multiple shares and distributes them to multiple nodes. However, due to node mobility, these key shares may not be available in the neighborhood when they are needed for key reconstruction. To address this challenge, we propose the Transitive Prediction (TRAP) protocol that distributes key shares among devices that are traveling together. We develop three key distribution schemes that utilize the correlation relationship embedded among devices that are traveling together. Our key distribution schemes maximize the chance of successful key reconstruction and minimize the communication overhead. We provide theoretical analysis of the robustness and security of TRAP. Our simulation results, by using the generated data from city environment and NS-2 simulator, demonstrate the efficiency and effectiveness of our key distribution schemes.
引用
收藏
页码:1387 / 1406
页数:20
相关论文
共 50 条
  • [31] Decentralized Slicing in Mobile Low-Power Wireless Networks
    Jaszkowski, Piotr
    Sienkowski, Pawel
    Iwanicki, Konrad
    PROCEEDINGS 12TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2016), 2016, : 177 - 186
  • [32] IPSec-Based Key Management in Mobile IP Networks
    Wang, Neng-Chung
    Chen, Jong-Shin
    Huang, Yung-Fa
    Chan, Tzu-Wei
    PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMMUNICATIONS: NEW ASPECTS OF COMMUNICATIONS, 2008, : 190 - +
  • [33] Key management in wireless sensor networks
    Lee, YH
    Phadke, V
    Deshmukh, A
    Lee, JW
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 190 - 204
  • [34] Multicasting Key Management in Wireless Networks
    Wang, Yiling
    Ngo, Huy Hoang
    Le, Phu Dung
    Srinivasan, Balasubramaniam
    Malhotra, Vishv
    2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 234 - +
  • [35] Key management in wireless sensor networks
    Lopriore, Lanfranco
    INFORMATION SECURITY JOURNAL, 2019, 28 (1-2): : 20 - 34
  • [36] Key Management in Wireless Sensor Networks
    Mansour, Ismail
    Chalhoub, Gerard
    Lafourcade, Pascal
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2015, 4 (03): : 251 - 273
  • [37] A Novel Pattern Prediction and Bandwidth Management Scheme in Wireless Networks with Mobile Hosts
    Tropea, Mauro
    Marano, Salvatore
    2013 IEEE 77TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2013,
  • [38] Key management for mobile sensor networks
    Sanchez Sanchez, David
    Baldus, Heribert
    SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 14 - 26
  • [39] Prediction-based Clustering Algorithm for Mobile Wireless Sensor Networks
    Koucheryavy, Andrey
    Salim, Ahmed
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1209 - 1215
  • [40] Secure clustering and routing for heterogeneous mobile wireless sensor networks with dynamic key management
    Kesavan, V. Thiruppathy
    Radhakrishnan, S.
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2016, 28 (06) : 971 - 988