用户名: 密码: 验证码:
Keyless Security in Wireless Networks
详细信息    查看全文
  • 作者:Salah A. Albermany (1)
    Ghazanfar A. Safdar (1)
  • 关键词:Communication ; Keyless ; Security ; Networks
  • 刊名:Wireless Personal Communications
  • 出版年:2014
  • 出版时间:December 2014
  • 年:2014
  • 卷:79
  • 期:3
  • 页码:1713-1731
  • 全文大小:689 KB
  • 参考文献:1. Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. / IEEE Transactions on Information Theory, / 22(6), 644鈥?54. CrossRef
    2. Ingemarsson, I., Tang, D., & Wong, C. (1982). A conference key distribution system. / IEEE Transactions on Information Theory, / 28(5), 714鈥?20. CrossRef
    3. Okamoto, E., & Tanaka, K. (1989). Key distribution system based on identification information. / IEEE Journal on Selected Areas in Communications, / 7(4), 481鈥?85. CrossRef
    4. Bellovin, S. M., & Merritt, M. (1992). Encrypted key exchange: Password-based protocols secure against dictionary attacks. In / Proceedings of IEEE symposium security and privacy, pp. 72鈥?4.
    5. Joux, A. (2003). A one round protocol for tripartite Diffie鈥揌ellman. / Journal of Cryptology, / 17(4), 263鈥?76.
    6. Stinson, Douglas R. (2006). / Cryptography theory and practice. London: Taylor & Francis Group, LLC Chapman & Hall/CRC.
    7. Alpern, Bowen, & Schneider, Fred B. (1983). Key exchange using keyless cryptography. / Information Processing Letters, / 16(2), 79鈥?1. CrossRef
    8. Korjik, V., & Bakin, M. (2000). Information-theoretically secure keyless authentication. In / IEEE international symposium on information theory, pp. 20.
    9. Baird, L. C., Bahn, W. L., Collins, M. D., Carlisle, M. C., & Butler, S. C. (2007). Keyless jam resistance. In / IEEE SMC information assurance and security workshop, 2007, IAW 鈥?7, 20鈥?2 June 2007, pp. 143鈥?50.
    10. Shamir, A. (1979). How to share a secret. / Communications of the ACM, / 22(11), 612鈥?13. CrossRef
    11. Karnin, E. D., Greene, J. W., & Hellman, M. E. (1983). On secret sharing systems. / IEEE Transactions on Information Theory, / 29(1), 35鈥?1. CrossRef
    12. Luh, W., & Kundur, D. (2007). Distributed keyless secret sharing over noiseless channels. In / IEEE Global Telecommunications Conference, 2007, GLOBECOM 鈥?7, 26鈥?0 November 2007, pp. 44鈥?8.
    13. Czarlinska, A., Huh, W., & Kundur, D. (2008). On privacy and security in distributed visual sensor networks. In / 15th IEEE international conference on image processing, 2008. ICIP 2008, 12鈥?5 October 2008, pp. 1692鈥?695.
    14. Hu, Y., Zhang, Y., & Sun, B. (2009). Design of RKE system based on KEELOQ encryption technology. In / International conference on artificial intelligence and computational intelligence, 2009, AICI 鈥?9. Vol. 1, November 7鈥?, 2009, pp. 324鈥?27.
    15. Moradi, A., & Kasper, T. (2009). A new remote keyless entry system resistant to power analysis attacks. In / 7th International conference on information, communications and signal processing, 2009. ICICS 2009. December 8鈥?0, 2009, pp. 1鈥?.
    16. National Inst. of Standards and Technology, Federal Information Processing Standard Publication 197, the Advanced Encryption Standard (AES), 2001.
    17. Lianhao, L., Ehoussou, J., Youssouf, A. E., & Armand, Y. G. (2010). Identification technology research on AES for automobile keyless system. In / 2010 International conference on computational intelligence and software engineering (CiSE), December 10鈥?2, 2010, pp. 1鈥?.
    18. Oguma, H., Nobata, N., Nawa, K., Mizota, T., & Shinagawa, M. (2011). Passive keyless entry system for long term operation. In / 2011 IEEE international symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), June 20鈥?4, 2011, pp. 1鈥?.
    19. Goldstein, H. (2006). A touch too much [intrabody communications]. / IEEE Spectrum, / 43(1), 24鈥?5. CrossRef
    20. Malik, S., Sardana, A., & Jaya, J. (2012). A keyless approach to image encryption. In / 2012 International conference on communication systems and network technologies (CSNT), May 11鈥?3, 2012, pp. 879鈥?83.
    21. Rai, S., & Dubey, R. (2012). A novel keyless algorithm for steganography. In / 2012 Students conference on engineering and systems (SCES), pp. 1鈥?.
    22. Amirtharajan, R., & Balaguru, R. J. B. (2009). Tri-layer stego for enhanced security鈥攁 keyless random approach. / 2009 IEEE international conference on internet multimedia services architecture and applications (IMSAA), pp. 1鈥?.
    23. Gang, Q. (2001). Keyless public watermarking for intellectual property authentication. In Ira S. Moskowitz, (Ed.) / Proceedings of the 4th international workshop on information hiding (IHW 鈥?1) (pp. 96鈥?11). London, UK: Springer.
    24. Kaushik, A., Satvika, M. B., & Kumar, A. (2012). Keyless user defined optimal security encryption. / International Journal of Computer and Electrical Engineering, / 4(2), 99鈥?03. CrossRef
    25. Bertino, E., & Sandhu, R. (2005). Database security鈥攃oncepts, approaches, and challenges. / IEEE Transactions on Dependable and Secure Computing, / 2(1), 2鈥?9. CrossRef
    26. Fu, Anmin, Zhang, Yuqing, Zhu, Zhenchao, & Liu, Xuefeng. (2010). A fast handover authentication mechanism based on ticket for IEEE 802.16m. / IEEE Communications Letters, / 14(12), 1134鈥?136. CrossRef
    27. Oppliger, R. (2007). Providing certified mail services on the internet. / IEEE Security & Privacy, / 5(1), 16鈥?2. CrossRef
    28. Ni-Na, S., & Hai-Yan, Z. (2011). On providing integrity for dynamic data based on the third-party verifier in cloud computing. In / International conference on instrumentation, measurement, computer, communication and control, pp. 521鈥?24.
    29. Milenkovic, O. (2001). On the generalized Hamming weight enumerators and coset weight distributions of even isodual codes. In / IEEE international symposium on information theory, pp. 62.
  • 作者单位:Salah A. Albermany (1)
    Ghazanfar A. Safdar (1)

    1. Department of CST, University of Bedfordshire, Park Square, Luton, LU1 3JU, UK
  • ISSN:1572-834X
文摘
Security in mobile wireless networks is difficult to achieve because of vulnerability of the links, inadequate physical protection, dynamically changing topology and the sporadic nature of the connectivity. The change in topology results in the change of trust relationships among the communicating nodes and as a consequence any security solution with a static configuration will not suffice. Key management and related protocols play a vital role and are the basis of security in many distributed systems. Cryptographic keys require dedicated mechanisms in place for their exchange before substantial security can be achieved; subsequently this exchange results in additional overhead and is prone to serious compromise of the security. The drawbacks of key oriented cryptographic techniques have resulted in the demand to develop keyless security schemes. This paper presents a novel keyless security scheme Reaction Automata Direct Graph (RADG), which is based on automata direct graph and reaction states. The novelty of RADG lies in the fact that it does not require any key to perform the cryptographic operations thus making it a feasible scheme for large wireless systems. Paper presents implementation of RADG and the results have shown that the hamming distance between individual cipher texts differ significantly a lot making the process of code breaking within the large systems very difficult compared to the schemes that rely on classical cryptography. The Security analysis of RADG proves that it is cryptographically sound in terms of confidentiality, integrity and non-repudiation.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700