Security

Multi-Path Key Establishment Against REM Attacks in Wireless Ad Hoc Networks

Free registration required

Executive Summary

Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, full key-connectivity cannot be achieved by key pre-distribution. In this paper, the authors develop an analytical framework for the on-demand key establishment approach. The authors propose a novel security metric, called REM resilience vector to quantify the resilience of any key establishment schemes against Revealing, Erasure, and Modification (REM) attacks. The analysis shows that previous key establishment schemes are vulnerable under REM attacks. Relying on the new security metric, the authors prove a universal bound on achievable REM resilience vectors for any on-demand key establishment scheme.

  • Format: PDF
  • Size: 239.6 KB