File(s) under permanent embargo
Frequency switch, secret sharing and recursive use of hash functions secure (low cost) ad hoc networks
conference contribution
posted on 2018-01-01, 00:00 authored by P Sarkar, Morshed ChowdhuryMorshed Chowdhury, Jemal AbawajyJemal Abawajy© 2018, Springer International Publishing AG. Low cost ad hoc networks like Wireless Sensor Networks (WSNs) are best suited to gather sensory information. Sensitivity of these classified information leads to the necessity of implementing security protocols during their exchange. Such implementations use cryptosystems that may suit resourceful Internet of Things (IoT) devices; but overburdens tiny sensors. Moreover most protocols assume that an adversary is well versed with all system information, barring the cryptographic keys. As such the (fixed) operational frequency bands between a given pair of nodes is assumed to be known at all times. Such a strong assumption may not be always necessary in real life deployment zones. In fact tracking an operational frequency between sensors from a range of bands may be difficult in a large network [15]; though not hard. This leads to a hard problem, i.e., to keep track of recursive switch of operational frequencies between a given pair of sensors for consecutive timestamps. We exploit hardness of this problem to achieve confidentiality of message exchange between pairs of nodes. Message to be transmitted is split using secret sharing technique [18]. Each piece is then transmitted via different bands obtained by recursive use of cryptographic hash function on initial preallocated bands. Our approach does not consume extra energy during message transmission or receipt in comparison to existing wireless systems. Storage requirement is minimized to storage of hash functions; no cryptographic key stored. Security achieved is comparable to any existing cryptosystem.
History
Volume
580Pagination
315-328Location
Ningbo, ChinaPublisher DOI
Start date
2017-06-16End date
2017-06-18ISSN
2194-5357ISBN-13
9783319670706Language
engPublication classification
E1 Full written paper - refereedCopyright notice
2018, Springer International Publishing AGEditor/Contributor(s)
Abawajy J, Choo KK, Islam RTitle of proceedings
ATCI 2017 : International Conference on Applications and Techniques in Cyber Security and IntelligenceEvent
Applications and Techniques in Cyber Intelligence. International Conference (2017 : Ningbo, China)Publisher
SpringerPlace of publication
Cham, SwitzerlandSeries
Advances in Intelligent Systems and ComputingUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC