IDEALS Home University of Illinois at Urbana-Champaign logo The Alma Mater The Main Quad

SMOCK: A Scalable Method of Cryptographic Key Management For Mission-Critical Networks

Show full item record

Bookmark or cite this item: http://hdl.handle.net/2142/11208

Files in this item

File Description Format
PDF SMOCK A Scalabl ... sion-Critical Networks.pdf (199KB) (no description provided) PDF
Title: SMOCK: A Scalable Method of Cryptographic Key Management For Mission-Critical Networks
Author(s): He, Wenbo; Huang, Ying; Nahrstedt, Klara; Lee, Whay C.
Subject(s): networking
Abstract: In this paper, we study challenges and possible solutions to cryptographic key management in mission-critical networks. Existing symmetric key cryptography mechanisms do not scale well when supporting end-to-end secure and private communication. Existing public key cryptography mechanisms in self-organized ad hoc networks cannot resist a Sybil attack, where a single malicious node presents multiple identities to control a substantial fraction of a network. Therefore, we present a new paradigm of public key cryptography based on combinatorial design, called SMOCK, where nodes combine more than one key to encrypt and decrypt each message. Our key allocation scheme guarantees that a set of keys held by one user is not a subset of keys held by any other user. We show that our proposed method offers efficiency in memory usage, control data exchange, as well as controllable resilience against node captures.
Issue Date: 2006-06
Genre: Technical Report
Type: Text
URI: http://hdl.handle.net/2142/11208
Other Identifier(s): UIUCDCS-R-2006-2734
Rights Information: You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Date Available in IDEALS: 2009-04-21
 

This item appears in the following Collection(s)

Show full item record

Item Statistics

  • Total Downloads: 1502
  • Downloads this Month: 8
  • Downloads Today: 0

Browse

My Account

Information

Access Key