SMOCK: A scalable method of cryptographic key management for mission-critical wireless ad-hoc networks

Wenbo He, Ying Huang, Ravishankar Sathyam, Klara Nahrstedt, Whay C. Lee

Research output: Contribution to journalArticlepeer-review

Abstract

Mission-critical networks show great potential in emergency response and/or recovery, health care, critical infrastructure monitoring, etc. Such mission-critical applications demand that security service be anywhere, anytime, and anyhow. However, it is challenging to design a key management scheme in current mission-critical networks to fulfill the required attributes of secure communications, such as data integrity, authentication, confidentiality, nonrepudiation, and service availability. In this paper, we present a self-contained public key-management scheme, a scalable method of cryptographic key management (SMOCK), which achieves almost zero communication overhead for authentication, and offers high service availability. In our scheme, a small number of cryptographic keys are stored offline at individual nodes before they are deployed in the network. To provide good scalability in terms of the number of nodes and storage space, we utilize a combinatorial design of public-private key pairs, which means nodes combine more than one key pair to encrypt and decrypt messages. We also show that SMOCK provides controllable resilience when malicious nodes compromise a limited number of nodes before key revocation and renewal.

Original languageEnglish (US)
Article number4770150
Pages (from-to)140-150
Number of pages11
JournalIEEE Transactions on Information Forensics and Security
Volume4
Issue number1
DOIs
StatePublished - Mar 2009

Keywords

  • Combinatorial key management
  • Security in ubiquitous computing

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'SMOCK: A scalable method of cryptographic key management for mission-critical wireless ad-hoc networks'. Together they form a unique fingerprint.

Cite this