TY - JOUR
T1 - SMOCK
T2 - A scalable method of cryptographic key management for mission-critical wireless ad-hoc networks
AU - He, Wenbo
AU - Huang, Ying
AU - Sathyam, Ravishankar
AU - Nahrstedt, Klara
AU - Lee, Whay C.
N1 - Funding Information:
Manuscript received October 11, 2007; revised September 20, 2008. First published February 02, 2009; current version published February 11, 2009. This work was supported by Motorola under Grant 1-557641-239016-191100. The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Mohan Kankanhalli.
PY - 2009/3
Y1 - 2009/3
N2 - Mission-critical networks show great potential in emergency response and/or recovery, health care, critical infrastructure monitoring, etc. Such mission-critical applications demand that security service be anywhere, anytime, and anyhow. However, it is challenging to design a key management scheme in current mission-critical networks to fulfill the required attributes of secure communications, such as data integrity, authentication, confidentiality, nonrepudiation, and service availability. In this paper, we present a self-contained public key-management scheme, a scalable method of cryptographic key management (SMOCK), which achieves almost zero communication overhead for authentication, and offers high service availability. In our scheme, a small number of cryptographic keys are stored offline at individual nodes before they are deployed in the network. To provide good scalability in terms of the number of nodes and storage space, we utilize a combinatorial design of public-private key pairs, which means nodes combine more than one key pair to encrypt and decrypt messages. We also show that SMOCK provides controllable resilience when malicious nodes compromise a limited number of nodes before key revocation and renewal.
AB - Mission-critical networks show great potential in emergency response and/or recovery, health care, critical infrastructure monitoring, etc. Such mission-critical applications demand that security service be anywhere, anytime, and anyhow. However, it is challenging to design a key management scheme in current mission-critical networks to fulfill the required attributes of secure communications, such as data integrity, authentication, confidentiality, nonrepudiation, and service availability. In this paper, we present a self-contained public key-management scheme, a scalable method of cryptographic key management (SMOCK), which achieves almost zero communication overhead for authentication, and offers high service availability. In our scheme, a small number of cryptographic keys are stored offline at individual nodes before they are deployed in the network. To provide good scalability in terms of the number of nodes and storage space, we utilize a combinatorial design of public-private key pairs, which means nodes combine more than one key pair to encrypt and decrypt messages. We also show that SMOCK provides controllable resilience when malicious nodes compromise a limited number of nodes before key revocation and renewal.
KW - Combinatorial key management
KW - Security in ubiquitous computing
UR - http://www.scopus.com/inward/record.url?scp=60449084386&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=60449084386&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2008.2009601
DO - 10.1109/TIFS.2008.2009601
M3 - Article
AN - SCOPUS:60449084386
SN - 1556-6013
VL - 4
SP - 140
EP - 150
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 1
M1 - 4770150
ER -