Random Bit Extraction for Secret Key Generation in MANETs

被引:0
|
作者
K. R. Shibu
R. Suji Pramila
机构
[1] Noorul Islam Centre for Higher Education,Department of Computer Science and Engineering
来源
关键词
MANET; DSR; Routing data; Secret key;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile ad hoc networks are a group of random mobile nodes which does not have a pre-existing base stations or infrastructure. In order to make communications effective over these networks a security scheme is essential. This can be achieved by establishing some shared random bits generated with fundamental secret key generation techniques. This paper presents a secret key generation scheme suitable for networks adapted to dynamic source routing protocol. Investigations were carried out for the possibility of using a system metadata like routing information for randomness extraction. Using routing tables maintained by the nodes as backbone, we are extracting a set of common secret random data for key generation. The secret key generation starts with random source extraction followed by information reconciliation to reduce errors and privacy amplification to increase the confidentiality. The main advantage of this technique is that it utilizes the sources of randomness inherent in the system itself without increasing the computational complexity. It also helps to identify the presence of an adversary in the network. The results of the system are evaluated to analyze the efficiency of the technique in terms of packet loss and packet overhead.
引用
收藏
页码:2247 / 2261
页数:14
相关论文
共 50 条
  • [41] Covert Secret Key Generation With an Active Warden
    Tahmasbi, Mehrdad
    Bloch, Matthieu R.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1026 - 1039
  • [42] Polar Coding for Secret-Key Generation
    Chou, Remi A.
    Bloch, Matthieu R.
    Abbe, Emmanuel
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (11) : 6213 - 6237
  • [43] Secret Key Generation for Correlated Gaussian Sources
    Nitinawarat, Sirin
    Narayan, Prakash
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (06) : 3373 - 3391
  • [44] Secret Key Generation for Correlated Gaussian Sources
    Nitinawarat, Sirin
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 702 - 706
  • [45] Fault-Tolerant Secret Key Generation
    Tyagi, Himanshu
    Kashyap, Navin
    Sankarasubramaniam, Yogesh
    Viswanathan, Kapali
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [46] Common randomness and secret key generation with a helper
    Csiszár, I
    Narayan, P
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (02) : 344 - 366
  • [47] Secret Key Generation Via Localization and Mobility
    Gungor, Onur
    Chen, Fangzhou
    Koksal, Can Emre
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2015, 64 (06) : 2214 - 2230
  • [48] High-rate Secret Key Generation Method Using Two-way Random Signal
    Zhang, Shengjun
    Jin, Liang
    Lou, Yangming
    Huang, Kaizhi
    Zhong, Zhou
    2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 32 - 36
  • [49] Markov speckle for efficient random bit generation
    Horstmeyer, Roarke
    Chen, Richard Y.
    Judkewitz, Benjamin
    Yang, Changhuei
    OPTICS EXPRESS, 2012, 20 (24): : 26394 - 26410
  • [50] In-silico generation of random bit streams
    Caccia, M.
    Malinverno, L.
    Paolucci, L.
    Corridori, C.
    Proserpio, E.
    Abba, A.
    Cusimano, A.
    Kucewicz, W.
    Dorosz, P.
    Baszczyk, M.
    Esposito, M.
    Svenda, P.
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 2020, 980