2.50
Hdl Handle:
http://hdl.handle.net/10547/336096
Title:
Keyless security in wireless networks
Authors:
Albermany, Salah A.; Safdar, Ghazanfar Ali ( 0000-0001-8969-1044 )
Abstract:
Security in mobile wireless networks is difficult to achieve because of vulnerability of the links, inadequate physical protection, dynamically changing topology and the sporadic nature of the connectivity. The change in topology results in the change of trust relationships among the communicating nodes and as a consequence any security solution with a static configuration will not suffice. Key management and related protocols play a vital role and are the basis of security in many distributed systems. Cryptographic keys require dedicated mechanisms in place for their exchange before substantial security can be achieved; subsequently this exchange results in additional overhead and is prone to serious compromise of the security. The drawbacks of key oriented cryptographic techniques have resulted in the demand to develop keyless security schemes. This paper presents a novel keyless security scheme Reaction Automata Direct Graph (RADG), which is based on automata direct graph and reaction states. The novelty of RADG lies in the fact that it does not require any key to perform the cryptographic operations thus making it a feasible scheme for large wireless systems. Paper presents implementation of RADG and the results have shown that the hamming distance between individual cipher texts differ significantly a lot making the process of code breaking within the large systems very difficult compared to the schemes that rely on classical cryptography. The Security analysis of RADG proves that it is cryptographically sound in terms of confidentiality, integrity and non-repudiation.
Citation:
Albermany, S.A. & Safdar, G.A. (2014) 'Keyless Security in Wireless Networks', Wireless Personal Communication, 79 (3):1713
Publisher:
Springer Verlag
Journal:
Wireless Personal Communications
Issue Date:
2014
URI:
http://hdl.handle.net/10547/336096
DOI:
10.1007/s11277-014-1954-1
Additional Links:
http://link.springer.com/10.1007/s11277-014-1954-1
Type:
Article
Language:
en
ISSN:
0929-6212; 1572-834X
Appears in Collections:
Centre for Wireless Research (CWR)

Full metadata record

DC FieldValue Language
dc.contributor.authorAlbermany, Salah A.en
dc.contributor.authorSafdar, Ghazanfar Alien
dc.date.accessioned2014-11-25T13:53:46Z-
dc.date.available2014-11-25T13:53:46Z-
dc.date.issued2014-
dc.identifier.citationAlbermany, S.A. & Safdar, G.A. (2014) 'Keyless Security in Wireless Networks', Wireless Personal Communication, 79 (3):1713en
dc.identifier.issn0929-6212-
dc.identifier.issn1572-834X-
dc.identifier.doi10.1007/s11277-014-1954-1-
dc.identifier.urihttp://hdl.handle.net/10547/336096-
dc.description.abstractSecurity in mobile wireless networks is difficult to achieve because of vulnerability of the links, inadequate physical protection, dynamically changing topology and the sporadic nature of the connectivity. The change in topology results in the change of trust relationships among the communicating nodes and as a consequence any security solution with a static configuration will not suffice. Key management and related protocols play a vital role and are the basis of security in many distributed systems. Cryptographic keys require dedicated mechanisms in place for their exchange before substantial security can be achieved; subsequently this exchange results in additional overhead and is prone to serious compromise of the security. The drawbacks of key oriented cryptographic techniques have resulted in the demand to develop keyless security schemes. This paper presents a novel keyless security scheme Reaction Automata Direct Graph (RADG), which is based on automata direct graph and reaction states. The novelty of RADG lies in the fact that it does not require any key to perform the cryptographic operations thus making it a feasible scheme for large wireless systems. Paper presents implementation of RADG and the results have shown that the hamming distance between individual cipher texts differ significantly a lot making the process of code breaking within the large systems very difficult compared to the schemes that rely on classical cryptography. The Security analysis of RADG proves that it is cryptographically sound in terms of confidentiality, integrity and non-repudiation.en
dc.language.isoenen
dc.publisherSpringer Verlagen
dc.relation.urlhttp://link.springer.com/10.1007/s11277-014-1954-1en
dc.rightsArchived with thanks to Wireless Personal Communicationsen
dc.subjectcommunicationen
dc.subjectsecurityen
dc.subjectkeylessen
dc.subjectnetworken
dc.subjectwireless networksen
dc.titleKeyless security in wireless networksen
dc.typeArticleen
dc.identifier.journalWireless Personal Communicationsen
All Items in UOBREP are protected by copyright, with all rights reserved, unless otherwise indicated.