Deakin University
Browse

File(s) under permanent embargo

Frequency switch, secret sharing and recursive use of hash functions secure (low cost) ad hoc networks

conference contribution
posted on 2018-01-01, 00:00 authored by P Sarkar, Morshed ChowdhuryMorshed Chowdhury, Jemal AbawajyJemal Abawajy
© 2018, Springer International Publishing AG. Low cost ad hoc networks like Wireless Sensor Networks (WSNs) are best suited to gather sensory information. Sensitivity of these classified information leads to the necessity of implementing security protocols during their exchange. Such implementations use cryptosystems that may suit resourceful Internet of Things (IoT) devices; but overburdens tiny sensors. Moreover most protocols assume that an adversary is well versed with all system information, barring the cryptographic keys. As such the (fixed) operational frequency bands between a given pair of nodes is assumed to be known at all times. Such a strong assumption may not be always necessary in real life deployment zones. In fact tracking an operational frequency between sensors from a range of bands may be difficult in a large network [15]; though not hard. This leads to a hard problem, i.e., to keep track of recursive switch of operational frequencies between a given pair of sensors for consecutive timestamps. We exploit hardness of this problem to achieve confidentiality of message exchange between pairs of nodes. Message to be transmitted is split using secret sharing technique [18]. Each piece is then transmitted via different bands obtained by recursive use of cryptographic hash function on initial preallocated bands. Our approach does not consume extra energy during message transmission or receipt in comparison to existing wireless systems. Storage requirement is minimized to storage of hash functions; no cryptographic key stored. Security achieved is comparable to any existing cryptosystem.

History

Volume

580

Pagination

315-328

Location

Ningbo, China

Start date

2017-06-16

End date

2017-06-18

ISSN

2194-5357

ISBN-13

9783319670706

Language

eng

Publication classification

E1 Full written paper - refereed

Copyright notice

2018, Springer International Publishing AG

Editor/Contributor(s)

Abawajy J, Choo KK, Islam R

Title of proceedings

ATCI 2017 : International Conference on Applications and Techniques in Cyber Security and Intelligence

Event

Applications and Techniques in Cyber Intelligence. International Conference (2017 : Ningbo, China)

Publisher

Springer

Place of publication

Cham, Switzerland

Series

Advances in Intelligent Systems and Computing

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC