An efficient pairwise key establishment scheme for Ad-Hoc Mobile Clouds

An Ad-hoc Mobile Cloud (AMC) is a new computing model that allows sharing computing power of multiple mobile devices. For a diverse group of individuals that employ such computing model, in an ad-hoc manner, secure peer-to-peer communication becomes very important. Using private or pairwise keys to secure such communication is preferable to public-keys because of computation and energy requirements [1]. With the advent of sensor enabled mobile devices, a protocol (SekGens) that uses sensor data to generate pairwise keys on demand has been proposed [2]. To work successfully SekGens requires devices to be closely located and becomes infeasible for devices situated multiple hops away. SekGens is also expensive in computation and slow in key generation. In this paper, we investigate how to enable devices in an AMC to establish pairwise keys. We propose an efficient solution which tries to reduce the number of executions of SekGens in the AMC, and establishes pairwise keys between nodes multiple hops away by distributing parts of the key on multiple routing paths. Our results show a reduction of up to 75% in the number of SekGens required to establish keys in an AMC, when compared to a naive approach.

[1]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..

[2]  Hai Su,et al.  Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[3]  J. Wenny Rahayu,et al.  Mobile Crowd Computing with Work Stealing , 2012, 2012 15th International Conference on Network-Based Information Systems.

[4]  Frank Harary,et al.  Graph Theory , 2016 .

[5]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[6]  Kamal Jain A Factor 2 Approximation Algorithm for the Generalized Steiner Network Problem , 2001, Comb..

[7]  Minghua Chen,et al.  Routing for security in networks with adversarial nodes , 2013, 2013 International Symposium on Network Coding (NetCod).

[8]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[9]  J. Wenny Rahayu,et al.  Dynamic Mobile Cloud Computing: Ad Hoc and Opportunistic Job Sharing , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.

[10]  Taieb Znati,et al.  Path key establishment using multiple secured paths in wireless sensor networks , 2005, CoNEXT '05.

[11]  Yuguang Fang,et al.  A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions , 2004 .

[12]  Leandros Tassiulas,et al.  Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing , 2013, ACM Interational Symposium on Mobile Ad Hoc Networking and Computing.

[13]  Gábor Csárdi,et al.  The igraph software package for complex network research , 2006 .

[14]  Ala Altaweel,et al.  On secure shared key establishment for mobile devices using contextual information , 2015, 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC).

[15]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[16]  Wei-Tsung Su,et al.  Mobile cloud with smart offloading system , 2013, 2013 IEEE/CIC International Conference on Communications in China (ICCC).

[17]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[18]  Emina Soljanin,et al.  Secure Network Coding for Wiretap Networks of Type II , 2009, IEEE Transactions on Information Theory.

[19]  Gerardo Rubino,et al.  Network design with node connectivity constraints , 2003, LANC '03.

[20]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[21]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[22]  Chris J. Mitchell,et al.  Key storage in secure networks , 1988, Discret. Appl. Math..

[23]  .K Dhanya,et al.  A Virtual Cloud Computing Provider for Mobile Devices , 2017 .

[24]  Geoffrey G. Xie,et al.  Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud , 2015, IEEE Transactions on Cloud Computing.

[25]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[26]  Ning Cai,et al.  Secure Network Coding on a Wiretap Network , 2011, IEEE Transactions on Information Theory.

[27]  Geoffrey G. Xie,et al.  Energy-efficient fault-tolerant data storage & processing in dynamic networks , 2013, MobiHoc.

[28]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[29]  Cengis Hasan,et al.  2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) , 2013 .

[30]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[31]  Taieb Znati,et al.  End-to-end pairwise key establishment using multi-path in wireless sensor network , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..