Key Establishment in Heterogeneous Self-Organized Networks
dc.contributor.author | Taban, Gelareh | en_US |
dc.contributor.author | Safavi-Naini, Rei | en_US |
dc.contributor.department | ISR | en_US |
dc.date.accessioned | 2007-05-23T10:19:10Z | |
dc.date.available | 2007-05-23T10:19:10Z | |
dc.date.issued | 2007 | en_US |
dc.description.abstract | Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a single TTP however can be very strong in practice, especially when nodes belong to different domains and they come together in an ad hoc manner. Other important motivations to omit a TTP include preservation of privacy in a network as well as reducing the required knowledge base for the usage of sensor networks. In this work, we show the shortcomings of the previous approaches [3, 13] in terms of both efficiency and security. By incorporating a heterogeneous network, we show that we can dramatically reduce the load on resource constrained devices while also increasing their security. We also propose a new strengthened security model for self-organized ad hoc networks and evaluate the security of our protocol in this model. We evaluate the correctness of the protocol and show that we can achieve network connectivity with very high probability. | en_US |
dc.format.extent | 284007 bytes | |
dc.format.mimetype | application/pdf | |
dc.identifier.uri | http://hdl.handle.net/1903/6621 | |
dc.language.iso | en_US | en_US |
dc.relation.ispartofseries | ISR; TR 2007-6 | en_US |
dc.subject | Global Communication Systems | en_US |
dc.title | Key Establishment in Heterogeneous Self-Organized Networks | en_US |
dc.type | Technical Report | en_US |
Files
Original bundle
1 - 1 of 1