Files in this item



application/pdfSMOCK A Scalabl ... sion-Critical Networks.pdf (199kB)
(no description provided)PDF


Title:SMOCK: A Scalable Method of Cryptographic Key Management For Mission-Critical Networks
Author(s):He, Wenbo; Huang, Ying; Nahrstedt, Klara; Lee, Whay C.
Abstract:In this paper, we study challenges and possible solutions to cryptographic key management in mission-critical networks. Existing symmetric key cryptography mechanisms do not scale well when supporting end-to-end secure and private communication. Existing public key cryptography mechanisms in self-organized ad hoc networks cannot resist a Sybil attack, where a single malicious node presents multiple identities to control a substantial fraction of a network. Therefore, we present a new paradigm of public key cryptography based on combinatorial design, called SMOCK, where nodes combine more than one key to encrypt and decrypt each message. Our key allocation scheme guarantees that a set of keys held by one user is not a subset of keys held by any other user. We show that our proposed method offers efficiency in memory usage, control data exchange, as well as controllable resilience against node captures.
Issue Date:2006-06
Genre:Technical Report
Other Identifier(s):UIUCDCS-R-2006-2734
Rights Information:You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Date Available in IDEALS:2009-04-21

This item appears in the following Collection(s)

Item Statistics