Multi-party encryption (MPE): secure communications in delay tolerant networks

Abstract Mobile ad hoc networks are a subset of delay tolerant networks (DTNs) composed of several mobile devices. These dynamic environments make conventional security algorithms unreliable; nodes located far apart from each other may not have access (available) to each other’s public keys or have doubt on the validity of public-keys, making secure message exchange difficult. Furthermore, ad hoc networks are likely to be highly compromised and therefore may be untrusted. Other security methods, such as identity-based encryption and Kerberos, rely on requesting key data from a trusted third party, which can be unavailable or compromised in a DTN like environment. The purpose of this paper is to introduce two security overlay networks capable of delivering messages securely, preventing both eavesdropping and alteration of messages. The first algorithm, Chaining, uses multiple midpoints to re-encrypt the message for the destination node. The second, Fragmenting, separates the message key into pieces that are routed and secured independently from each other. Both techniques improve security in hostile environments; under test conditions, Chaining reduces the number of messages intercepted by 90 %, and Fragmenting by 83 %. This improvement has a performance trade-off, however, reducing the delivery ratio by 63 % in both algorithms.

[1]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[2]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[3]  Zhengyi Le,et al.  EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments , 2011, Secur. Commun. Networks.

[4]  Tassos Dimitriou,et al.  Multi-Party Trust Computation in Decentralized Environments , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[5]  Jonathan Katz,et al.  Threshold Cryptosystems Based on Factoring , 2002, ASIACRYPT.

[6]  Jing Deng,et al.  A Distributed Public Key Caching Scheme in Large Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[7]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[8]  H. Cruickshank,et al.  Security analysis for Delay/Disruption Tolerant satellite and sensor networks , 2009, 2009 International Workshop on Satellite and Space Communications.

[9]  A. Juels,et al.  Universal Re-encryption for Mixnets , 2004, CT-RSA.

[10]  Anders Lindgren,et al.  Probabilistic routing in intermittently connected networks , 2003, MOCO.

[11]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[12]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[13]  Shlomi Dolev,et al.  Efficient private multi-party computations of trust in the presence of curious and malicious users , 2014, Journal of Trust Management.

[14]  Gene Tsudik,et al.  Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks , 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference.

[15]  Mohit Jain,et al.  Notice of Violation of IEEE Publication Principles A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks , 2009 .

[16]  Sanjay Kumar Madria,et al.  Three Point Encryption (3PE): Secure Communications in Delay Tolerant Networks , 2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems.

[17]  S. Nedevschi,et al.  Hierarchical identity based cryptography for end-to-end security in DTNs , 2008, 2008 4th International Conference on Intelligent Computer Communication and Processing.

[18]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[19]  Sanjay Kumar Madria,et al.  SeRWA: A secure routing protocol against wormhole attacks in sensor networks , 2009, Ad Hoc Networks.

[20]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[21]  Paul F. Syverson,et al.  Private Web Browsing , 1997, J. Comput. Secur..

[22]  Alfred Menezes,et al.  On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols , 2006, INDOCRYPT.

[23]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[24]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[25]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[26]  Sokol Kosta,et al.  Small World in Motion (SWIM): Modeling Communities in Ad-Hoc Mobile Networking , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[27]  Kenneth H. Rosen,et al.  Discrete Mathematics and its applications , 2000 .