Neighborhood prediction based decentralized key management for mobile wireless networks

The wireless data collected in mobile environments provides tremendous opportunities to build new applications in various domains such as Vehicular Ad Hoc Networks and mobile social networks. Storing the data decentralized in wireless devices brings major advantages over centralized ones. In this work, to facilitate effective access control of the wireless data in the distributed data storage, we propose a fully decentralized key management framework by utilizing a cryptography-based secret sharing method. The secret sharing method splits the keys into multiple shares and distributes them to multiple nodes. However, due to node mobility, these key shares may not be available in the neighborhood when they are needed for key reconstruction. To address this challenge, we propose the Transitive Prediction (TRAP) protocol that distributes key shares among devices that are traveling together. We develop three key distribution schemes that utilize the correlation relationship embedded among devices that are traveling together. Our key distribution schemes maximize the chance of successful key reconstruction and minimize the communication overhead. We provide theoretical analysis of the robustness and security of TRAP. Our simulation results, by using the generated data from city environment and NS-2 simulator, demonstrate the efficiency and effectiveness of our key distribution schemes.

[1]  Moses D. Liskov,et al.  MPSS: Mobile Proactive Secret Sharing , 2010, TSEC.

[2]  Thomas Brinkhoff,et al.  Generating network-based moving objects , 2000, Proceedings. 12th International Conference on Scientific and Statistica Database Management.

[3]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[4]  John A. Silvester,et al.  Optimum transmission radii for packet radio networks or why six is a magic number , 1978 .

[5]  Mirco Musolesi,et al.  Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Eitan Altman,et al.  Coverage and connectivity of ad hoc networks presence of channel randomness , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[8]  Ramakrishnan Srikant,et al.  Fast algorithms for mining association rules , 1998, VLDB 1998.

[9]  Koen Langendoen,et al.  Distributed localization in wireless sensor networks: a quantitative compariso , 2003, Comput. Networks.

[10]  Hugo Krawczyk,et al.  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.

[11]  Moti Yung,et al.  Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[12]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[13]  Haiyun Luo,et al.  Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .

[14]  Liam McNamara,et al.  Media sharing based on colocation prediction in urban transport , 2008, MobiCom '08.

[15]  Alice Bob,et al.  The PGP Trust Model , 2005 .

[16]  Claudio Soriente,et al.  Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[17]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[18]  BettstetterChristian,et al.  Connectivity of wireless multihop networks in a shadow fading environment , 2005 .

[19]  Romit Roy Choudhury,et al.  SurroundSense: mobile phone localization via ambience fingerprinting , 2009, MobiCom '09.

[20]  Dirk Westhoff,et al.  Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .

[21]  Hugo Krawczyk,et al.  Robust and Efficient Sharing of RSA Functions , 1996, CRYPTO.

[22]  Sencun Zhu,et al.  pDCS: Security and Privacy Support for Data-Centric Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[23]  Aravind Srinivasan,et al.  Mobile Data Offloading through Opportunistic Communications and Social Participation , 2012, IEEE Transactions on Mobile Computing.

[24]  Yvo Desmedt,et al.  Parallel reliable threshold multisignature , 1992 .

[25]  Kamesh Namuduri,et al.  Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis , 2005, EURASIP J. Wirel. Commun. Netw..

[26]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[27]  Vaibhav Kumar,et al.  Mobile Proactive Secret Sharing in Cloud Computing , 2012 .

[28]  Robbert van Renesse,et al.  APSS: proactive secret sharing in asynchronous systems , 2005, TSEC.

[29]  Christian Bettstetter,et al.  How to achieve a connected ad hoc network with homogeneous range assignment: an analytical study with consideration of border effects , 2002, 4th International Workshop on Mobile and Wireless Communications Network.

[30]  Christian Bettstetter,et al.  Connectivity of Wireless Multihop Networks in a Shadow Fading Environment , 2005, Wirel. Networks.

[31]  Xiaoyan Hong,et al.  A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.

[32]  Yoji Kishi,et al.  Secure Data Sharing in Mobile Environments , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[33]  Deborah Estrin,et al.  Data-centric storage in sensornets , 2003, CCRV.

[34]  Yvo Desmedt,et al.  Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.

[35]  Jens Grossklags,et al.  Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks , 2003, Mobile Data Management.

[36]  Ramakrishnan Srikant,et al.  Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.

[37]  Wendy Hui Wang,et al.  A decentralized key management scheme via neighborhood prediction in mobile wireless networks , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[38]  Takashi Matsunaka,et al.  A Lightweight Approach to Protect Mobile Data , 2007, 2007 12th IEEE Symposium on Computers and Communications.

[39]  Li Gong,et al.  Increasing Availability and Security of an Authentication Service , 1993, IEEE J. Sel. Areas Commun..

[40]  Ran Canetti,et al.  Maintaining Authenticated Communication in the Presence of Break-Ins , 2000, Journal of Cryptology.

[41]  Mahbub Hassan,et al.  Analysis of per-node traffic load in multi-hop wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[42]  Ahmed Helmy,et al.  Modeling Time-Variant User Mobility in Wireless Mobile Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.