File(s) under permanent embargo
Frequency switch, secret sharing and recursive use of hash functions secure (low cost) ad hoc networks
conference contribution
posted on 2018-01-01, 00:00 authored by P Sarkar, Morshed ChowdhuryMorshed Chowdhury, Jemal AbawajyJemal Abawajy© 2018, Springer International Publishing AG. Low cost ad hoc networks like Wireless Sensor Networks (WSNs) are best suited to gather sensory information. Sensitivity of these classified information leads to the necessity of implementing security protocols during their exchange. Such implementations use cryptosystems that may suit resourceful Internet of Things (IoT) devices; but overburdens tiny sensors. Moreover most protocols assume that an adversary is well versed with all system information, barring the cryptographic keys. As such the (fixed) operational frequency bands between a given pair of nodes is assumed to be known at all times. Such a strong assumption may not be always necessary in real life deployment zones. In fact tracking an operational frequency between sensors from a range of bands may be difficult in a large network [15]; though not hard. This leads to a hard problem, i.e., to keep track of recursive switch of operational frequencies between a given pair of sensors for consecutive timestamps. We exploit hardness of this problem to achieve confidentiality of message exchange between pairs of nodes. Message to be transmitted is split using secret sharing technique [18]. Each piece is then transmitted via different bands obtained by recursive use of cryptographic hash function on initial preallocated bands. Our approach does not consume extra energy during message transmission or receipt in comparison to existing wireless systems. Storage requirement is minimized to storage of hash functions; no cryptographic key stored. Security achieved is comparable to any existing cryptosystem.
History
Event
Applications and Techniques in Cyber Intelligence. International Conference (2017 : Ningbo, China)Volume
580Series
Advances in Intelligent Systems and ComputingPagination
315 - 328Publisher
SpringerLocation
Ningbo, ChinaPlace of publication
Cham, SwitzerlandPublisher DOI
Start date
2017-06-16End date
2017-06-18ISSN
2194-5357ISBN-13
9783319670706Language
engPublication classification
E1 Full written paper - refereedCopyright notice
2018, Springer International Publishing AGEditor/Contributor(s)
J Abawajy, K Choo, R IslamTitle of proceedings
ATCI 2017 : International Conference on Applications and Techniques in Cyber Security and IntelligenceUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC