Symmetric Threshold Multipath (STM): An online symmetric key management scheme

The threshold secret sharing technique has been used extensively in cryptography. This technique is used for splitting secrets into shares and distributing the shares in a network to provide protection against attacks and to reduce the possibility of loss of information. In this paper, a new approach is introduced to enhance communication security among the nodes in a network based on the threshold secret sharing technique and traditional symmetric key management. The proposed scheme aims to enhance security of symmetric key distribution in a network. In the proposed scheme, key distribution is online which means key management is conducted whenever a message needs to be communicated. The basic idea is encrypting a message with a key (the secret) at the sender, then splitting the key into shares and sending the shares from different paths to the destination. Furthermore, a Pre-Distributed Shared Key scheme is utilized for more secure transmissions of the secret's shares. The proposed scheme, with the exception of some offline management by the network controller, is distributed, i.e., the symmetric key setups and the determination of the communication paths is performed in the nodes. This approach enhances communication security among the nodes in a network that operates in hostile environments. The cost and security analyses of the proposed scheme are provided.

[1]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[2]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[3]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[4]  Takashi Nishide,et al.  Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs , 2012, J. Inf. Process..

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  Dawn Song,et al.  Key distribution techniques for sensor networks , 2004 .

[7]  Chik How Tan,et al.  Energy-efficient and scalable group key agreement for large ad hoc networks , 2005, PE-WASUN '05.

[8]  Elaine B. Barker,et al.  Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes , 2010 .

[9]  Wei Ren,et al.  HybridS: A Scheme for Secure Distributed Data Storage in WSNs , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[10]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[11]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[12]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[13]  Chin-Fu Kuo,et al.  A novel key management scheme for wireless embedded systems , 2012, SIAP.

[14]  Manish Shrivastava,et al.  Securing Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc Network , 2013 .

[15]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[16]  Jie Wu,et al.  Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[17]  Sun Qian,et al.  A Novel Key Pre-distribution for Wireless Sensor Networks , 2012 .

[18]  Elaine B. Barker,et al.  SP 800-131A. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .

[19]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[20]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[21]  Yangmin Li,et al.  A verifiable dynamic threshold key management scheme based on bilinear pairing without a trusted party in mobile ad hoc network , 2012, 2012 IEEE International Conference on Automation and Logistics.

[22]  Takashi Nishide,et al.  Threshold ElGamal-based key management scheme for distributed RSUs in VANET , 2011, 2011 International Conference on Selected Topics in Mobile and Wireless Networking (iCOST).

[23]  Yang Lu,et al.  Threshold Certificate-based Encryption , 2009, J. Softw..

[24]  Craig Gentry,et al.  Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.

[25]  Imad Mahgoub,et al.  HIKES: Hierarchical key establishment scheme for wireless sensor networks , 2014, Int. J. Commun. Syst..

[26]  Wan An Xiong,et al.  Secure and highly efficient three level key management scheme for MANET , 2011 .

[27]  Alok Aggarwal,et al.  Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks , 2012, IC3.

[28]  Kaoru Kurosawa,et al.  Optimum Secret Sharing Scheme Secure against Cheating , 1996, EUROCRYPT.

[29]  Takashi Ito,et al.  A key pre-distribution scheme for secure sensor networks using probability density function of node deployment , 2005, SASN '05.