Optimal Key Generation Policies for MANET Security

被引:0
|
作者
Al-Zubaidy, Hussein [1 ]
Lambadaris, Ioannis [1 ]
Viniotis, Yannis [2 ]
Huang, Changcheng [1 ]
Hwang, Ren-Hung [3 ]
机构
[1] Carleton Univ, SCE, 1125 Colonel Dr, Ottawa, ON K1S 5B6, Canada
[2] Carolina State Univ, ECE, Raleigh, NC USA
[3] NCCU, Chiayi, Taiwan
关键词
CONNECTIVITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this work, we investigate the optimal key generation problem for a threshold security scheme in mobile ad hoc networks. The nodes in these networks are assumed to have limited power and critical security states. We model this problem using a closed discrete-time queuing system with L queues (one per node) randomly connected to K servers (where K nodes need to be contacted to construct a key). In this model, each queue length represents the available security-related credits of the corresponding node. We treat this problem as a resource allocation problem where the resources to be allocated are the limited power and security credits. We introduce the class of Most Balancing Credit Conserving (MBCC) policies and provide their mathematical characterization. We prove, using dynamic coupling arguments, that MBCC policies are optimal among all key generation policies; we define optimality as maximization, in a stochastic ordering sense, of a random variable representing the number of keys generated for a given initial system state.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Security issues and their solutions in MANET
    Sharma, Shilpi Burman
    Chauhan, Nidhi
    [J]. 2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 320 - 325
  • [22] Security in Tactical MANET Deployments
    Stent, Stuart
    [J]. COMMUNICATION AND NETWORKING, 2009, 56 : 455 - 469
  • [23] Cooperative Security Agents for MANET
    Mohite, Vaishali
    Ragha, Lata
    [J]. PROCEEDINGS OF THE 2012 WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2012, : 549 - 554
  • [24] Optimal security patch management policies maximizing system availability
    Uemura T.
    Dohi T.
    [J]. Journal of Communications, 2010, 5 (01): : 71 - 80
  • [25] Optimal thresholding for key generation based on biometrics
    Zhang, WD
    Chang, YJ
    Chen, TH
    [J]. ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 3451 - 3454
  • [26] AN OPTIMAL CLASS OF SYMMETRICAL KEY GENERATION SYSTEMS
    BLOM, R
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1985, 209 : 335 - 338
  • [27] Information security trade-offs and optimal patching policies
    Ioannidis, Christos
    Pym, David
    Williams, Julian
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2012, 216 (02) : 434 - 444
  • [28] Key Management for the MANET: A Survey
    Selim, Bassant
    Yeun, Chan Yeob
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY RESEARCH (ICTRC), 2015, : 326 - 329
  • [29] Optimal Deployment of Security Policies: Application to Industrial Control Systems
    Ismail, Ziad
    Leneutre, Jean
    Fourati, Alia
    [J]. 2018 14TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2018), 2018, : 120 - 127
  • [30] Optimal policies to promote efficient distributed generation of electricity
    David P. Brown
    David E. M. Sappington
    [J]. Journal of Regulatory Economics, 2017, 52 : 159 - 188