Random Bit Extraction for Secret Key Generation in MANETs

被引:0
|
作者
K. R. Shibu
R. Suji Pramila
机构
[1] Noorul Islam Centre for Higher Education,Department of Computer Science and Engineering
来源
关键词
MANET; DSR; Routing data; Secret key;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile ad hoc networks are a group of random mobile nodes which does not have a pre-existing base stations or infrastructure. In order to make communications effective over these networks a security scheme is essential. This can be achieved by establishing some shared random bits generated with fundamental secret key generation techniques. This paper presents a secret key generation scheme suitable for networks adapted to dynamic source routing protocol. Investigations were carried out for the possibility of using a system metadata like routing information for randomness extraction. Using routing tables maintained by the nodes as backbone, we are extracting a set of common secret random data for key generation. The secret key generation starts with random source extraction followed by information reconciliation to reduce errors and privacy amplification to increase the confidentiality. The main advantage of this technique is that it utilizes the sources of randomness inherent in the system itself without increasing the computational complexity. It also helps to identify the presence of an adversary in the network. The results of the system are evaluated to analyze the efficiency of the technique in terms of packet loss and packet overhead.
引用
收藏
页码:2247 / 2261
页数:14
相关论文
共 50 条
  • [31] Extraction of TLS Master Secret Key in Windows
    Lee, Hyoseok
    Choi, Hyoung-kee
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 667 - 671
  • [32] Cheating Detectable Secret Sharing Schemes for Random Bit Strings
    Ogata, Wakaha
    Araki, Toshinori
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (11) : 2230 - 2234
  • [33] Efficient key generation leveraging wireless channel reciprocity for MANETs
    Zhan, Furui
    Yao, Nianmin
    Gao, Zhenguo
    Yu, Haitao
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 103 : 18 - 28
  • [34] Key Generation for Multi-Secret Steganography
    Koptyra, Katarzyna
    Ogiela, Marek R.
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 1 - 4
  • [35] Secret Key Generation Using OFDM Samples
    Kakkar, Shantnu
    Makkar, Inderpreet Singh
    Mohapatra, A. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (04): : 439 - 454
  • [36] Authentication Based on Secret-Key Generation
    Willems, Frans M. J.
    Ignatenko, Tanya
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [37] Power Allocation Strategy for Secret Key Generation
    Zhang, Bin
    Waqas, Muhammad
    Tu, Shanshan
    Hussain, Syed Mudassir
    Rehman, Sadaqat Ur
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 2179 - 2188
  • [38] The Role of Channel States in Secret Key Generation
    He, Xiang
    Yener, Aylin
    2010 IEEE 21ST INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2010, : 2681 - 2686
  • [39] Polar Coding for Secret-Key Generation
    Chou, Remi A.
    Bloch, Matthieu R.
    Abbe, Emmanuel
    2013 IEEE INFORMATION THEORY WORKSHOP (ITW), 2013,
  • [40] Secret Key Generation via a Modified Quantum Secret Sharing Protocol
    Smith, A. M.
    Evans, P. G.
    lawrie, B.
    Legre, M.
    Lougovski, P.
    Ray, W.
    Williams, B. P.
    Qi, B.
    Grice, W. P.
    QUANTUM INFORMATION AND COMPUTATION XIII, 2015, 9500