You are not logged in.

A cross-layer key establishment scheme in wireless mesh networks

Zhang,Y, Xiang,Y, Huang,X and Xu,L 2014, A cross-layer key establishment scheme in wireless mesh networks. In Kutylowski,M and Vaidya,J (ed), Computer Security - ESORICS 2014, Springer, Berlin, Germany, pp.526-541, doi: 10.1007/978-3-319-11203-9_30.

Attached Files
Name Description MIMEType Size Downloads

Title A cross-layer key establishment scheme in wireless mesh networks
Author(s) Zhang,Y
Xiang,YORCID iD for Xiang,Y orcid.org/0000-0001-5252-0831
Huang,X
Xu,L
Title of book Computer Security - ESORICS 2014
Editor(s) Kutylowski,M
Vaidya,J
Publication date 2014
Series Lecture Notes in Computer Science
Chapter number 30
Total chapters 30
Start page 526
End page 541
Total pages 16
Publisher Springer
Place of Publication Berlin, Germany
Keyword(s) Channel phase
Coding
Cross-layer
Key establishment
Wireless mesh networks
Science & Technology
Technology
Computer Science, Information Systems
Computer Science, Theory & Methods
Computer Science
SECRET
GENERATION
CHANNELS
Summary Cryptographic keys are necessary to secure communications among mesh clients in wireless mesh networks. Traditional key establishment schemes are implemented at higher layers, and the security of most such designs relies on the complexity of computational problems. Extracting cryptographic keys at the physical layer is a promising approach with information-theoretical security. But due to the nature of communications at the physical layer, none of the existing designs supports key establishment if communicating parties are out of each other's radio range, and all schemes are insecure against man-in-the-middle attacks. This paper presents a cross-layer key establishment scheme where the established key is determined by two partial keys: one extracted at the physical layer and the other generated at higher layers. The analysis shows that the proposed cross-layer key establishment scheme not only eliminates the aforementioned shortcomings of key establishment at each layer but also provides a flexible solution to the key generation rate problem. © 2014 Springer International Publishing Switzerland.
ISBN 9783319112039
ISSN 0302-9743
1611-3349
Language eng
DOI 10.1007/978-3-319-11203-9_30
Field of Research 080303 Computer System Security
Socio Economic Objective 890202 Application Tools and System Utilities
HERDC Research category B1 Book chapter
ERA Research output type B Book chapter
Copyright notice ©2014, Springer
Persistent URL http://hdl.handle.net/10536/DRO/DU:30067738

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 190 Abstract Views, 6 File Downloads  -  Detailed Statistics
Created: Thu, 02 Apr 2015, 14:01:56 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.