A distributed key establishment scheme for wireless mesh networks using identity-based cryptography

Karaoğlan Altop, Duygu and Levi, Albert and Savaş, Erkay (2010) A distributed key establishment scheme for wireless mesh networks using identity-based cryptography. In: 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet '10), Bodrum, Turkey

[thumbnail of p11-karaoglan.pdf] PDF
p11-karaoglan.pdf

Download (1MB)

Abstract

In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a trusted authority for private key operations. Rather, this task is performed by a collaboration of users; a threshold number of users come together in a coalition so that they generate the private key. We performed simulative performance evaluation in order to show the effect of both the network size and the threshold value. Results show a tradeoff between resiliency and efficiency: increasing the threshold value or the number of mesh nodes also increases the resiliency but negatively effects the efficiency. For threshold values smaller than 8 and for number of mesh nodes in between 40 and 100, at least 90% of the mesh nodes can compute their private keys within at most 70 seconds. On the other hand, at threshold value 8, an increase in the number of mesh nodes from 40 to 100 results in 25% increase in the rate of successful private key generations.
Item Type: Papers in Conference Proceedings
Uncontrolled Keywords: Wireless Mesh Networks, Key Establishment, Identity-Based Cryptography, Threshold Secret Sharing
Divisions: Faculty of Engineering and Natural Sciences > Academic programs > Computer Science & Eng.
Faculty of Engineering and Natural Sciences
Depositing User: Albert Levi
Date Deposited: 29 Nov 2010 11:51
Last Modified: 26 Apr 2022 08:58
URI: https://research.sabanciuniv.edu/id/eprint/15389

Actions (login required)

View Item
View Item