Optimal Key Generation Policies for MANET Security

被引:0
|
作者
Al-Zubaidy, Hussein [1 ]
Lambadaris, Ioannis [1 ]
Viniotis, Yannis [2 ]
Huang, Changcheng [1 ]
Hwang, Ren-Hung [3 ]
机构
[1] Carleton Univ, SCE, 1125 Colonel Dr, Ottawa, ON K1S 5B6, Canada
[2] Carolina State Univ, ECE, Raleigh, NC USA
[3] NCCU, Chiayi, Taiwan
关键词
CONNECTIVITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this work, we investigate the optimal key generation problem for a threshold security scheme in mobile ad hoc networks. The nodes in these networks are assumed to have limited power and critical security states. We model this problem using a closed discrete-time queuing system with L queues (one per node) randomly connected to K servers (where K nodes need to be contacted to construct a key). In this model, each queue length represents the available security-related credits of the corresponding node. We treat this problem as a resource allocation problem where the resources to be allocated are the limited power and security credits. We introduce the class of Most Balancing Credit Conserving (MBCC) policies and provide their mathematical characterization. We prove, using dynamic coupling arguments, that MBCC policies are optimal among all key generation policies; we define optimality as maximization, in a stochastic ordering sense, of a random variable representing the number of keys generated for a given initial system state.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Key Authentication for MANET Security
    Kumar, Vijay
    Sharma, Rakesh
    Kush, Ashwani
    [J]. HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 497 - +
  • [2] Enhancing Manet Security Using Hybrid Techniques in Key Generation Mechanism
    Dhanalakshmi, K. S.
    Kannapiran, B.
    Divya, A.
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [3] Dynamic workflow generation with interoperable security alerts in MANET
    Fung, Casey K.
    Hung, Patrick C. K.
    Kearns, William M.
    Uczekaj, Stephen A.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2007, : 418 - +
  • [4] MANET Security Betterment by Enhanced Multiple Key Management Scheme
    Mohandas, R.
    Krishnamoorthi, K.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2173 - 2188
  • [5] MANET Security Betterment by Enhanced Multiple Key Management Scheme
    R. Mohandas
    K. Krishnamoorthi
    [J]. Wireless Personal Communications, 2017, 94 : 2173 - 2188
  • [6] Optimal Policies for Security Patch Management
    Dey, Debabrata
    Lahiri, Atanu
    Zhang, Guoying
    [J]. INFORMS JOURNAL ON COMPUTING, 2015, 27 (03) : 462 - 477
  • [7] Session key agreement protocol for end-to-end security in MANET
    Lim, Jeong-Mi
    Park, Chang-Seop
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 679 - 686
  • [8] Optimal Key Generation for Data Sanitization and Restoration of Cloud Data: Future of Financial Cyber Security
    Balashunmugaraja, B.
    Ganeshbabu, T. R.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2020, 19 (04) : 987 - 1013
  • [9] MANET Security Issues
    Garg, Nishu
    Mahapatra, R. P.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 241 - 246
  • [10] MANET Security: A Survey
    Alani, Mohammed M.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM COMPUTING AND ENGINEERING, 2014, : 559 - 564