By Topic

Energy-efficient key distribution and revocation in tactical networks with asymmetric links

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Reidt, S. ; Inf. Security Group, R. Holloway, Univ. of London, Egham, UK ; Wolthusen, S.D.

Wildcard identity-based encryption (IBE) provides an effective means of communicating among groups which do not have a well-defined membership or hierarchy pre-established, as may frequently be the case in dynamic coalition operations. The protection of group communication against compromised nodes is, however, expensive in that it typically requires frequent re-keying in the case of attribute-based IBE or voting-based revocation mechanisms, which can be problematic in multi-hop ad-hoc networks. In this paper we investigate the use of asymmetric communication links such as may be provided by unmanned aerial vehicles to provide efficient revocation mechanisms for small ad-hoc networks. Such link characteristics allow the efficient maintenance and propagation of blacklists as proposed by Saxena et al. and also enable the development of probability and plausibility metrics for revocation requests. We therefore propose a scheme for the distribution of group keys that requires nodes of the group to collaborate in order to obtain the group secret key. Consequently, untrusted nodes are hindered from communicating with other groups. This isolation from untrusted nodes allows to avoid or at least to postpone expensive node revocations which require the rekeying of the whole group.

Published in:

Military Communications Conference, 2009. MILCOM 2009. IEEE

Date of Conference:

18-21 Oct. 2009