Multi-path Key Establishment under Byzantine Attacks in Wireless Ad Hoc Networks

T. Lan,R. Lee,M. Chiang
2008-01-01
Abstract:Secure communications in wireless ad hoc networks are protected by setting up end-to-end secret keys for communicating node pairs. Secret keys can be provided by pre-loading shared secrets (e.g. a set of potential keys or keying information) into nodes prior to deployment. However, due to physical limitations of nodes and network scalability requirements, this key pre-distribution approach is not able to achieve full keyconnectivity for all communicating pairs. Therefore, on-demand key establishment, in which pairwise secret keys are derived by exchanging multiple keying messages among wireless nodes, becomes necessary. In this paper, we develop a theoretical framework for the ondemand key establishment approach. Our contributions include a novel security metric, which we call a Byzantine resilience vector, to quantify the resilience of any key establishment scheme against Byzantine (arbitrary) attacks. Our analysis shows that previous key establishment schemes are vulnerable under Byzantine attacks. We prove a universal bound on achievable Byzantine resilience vectors for any on-demand key establishment scheme. We show that this bound, which characterizes the optimal security analytically, is tight, by proposing a Byzantineresilient key establishment scheme which achieves any vector within this bound. In addition, we also propose a class of low complexity key establishment schemes which achieves nearlyoptimal Byzantine attack resilience. The security and complexity of the proposed schemes are analyzed.
What problem does this paper attempt to address?