1-End To End Secure MultiHop-1911.05126v1
1-End To End Secure MultiHop-1911.05126v1
gharib@jhu.edu, soudeh@cs.jhu.edu
2
Sharif University of Technology, Tehran, Iran
owfi@ce.sharif.edu
1 Introduction
Cyber physical systems (CPS) are increasingly deployed in mission-critical sys-
tems such as self-driving cars [20]. While most of such systems could be imple-
mented with expensive infrastructure, the better solution is to implement them
based on the peer-to-peer network node cooperation [21]. Smart intersections,
where the cars never stop at a red light unless there will be actual crossing traffic,
is an instance [5]. Vehicle to vehicle communication is another example while it
can potentially help to prevent 74% of all traffic accidents including those with
drivers impaired by alcohol or drowsiness, as reported by national highway traffic
2 M. Gharib et. al.
safety administration of the U.S. [30]. To be able to rely on these systems, the
security of the underlying multi-hop wireless networks, such as mobile ad hoc
networks (MANET), vehicular ad hoc networks (VANET), and wireless sensor
networks (WSN), is critical. Alas, the lack of trusted infrastructures and lim-
ited node resources make securing communications in such networks challenging.
Concretely, while cryptography is a general and powerful approach to improve
security, it is not well suited for such networks. This is because cryptography
techniques, such as public key infrastructure (PKI), commonly rely on a key
management system and most of the key management tasks are assigned to a
trusted third party (TTP) or several distributed TTPs that are based on in-
frastructure. In contrast, multi-hop wireless networks in cyber-physical systems
are fully decentralized and lack a fixed infrastructure that can act as the TTP.
Plus, nodes in such networks have limited memory, computational, and trans-
mission resources. Consequently, the naive solution of storing all keys in every
single node for encrypting and decrypting messages is also not practical in these
networks, especially in large-scale ones.
Key pre-distribution schemes [9] seem to be a promising solution due to
their distributed and lightweight nature. Key pre-distribution schemes store just
k keys in each node, where k << n and n is the number of network nodes.
The set of stored keys in each node is referred to as its keyring. Once a node
encrypts a message with a key, only those nodes with a shared key are capable
of decrypting it. Thus, a pair of nodes can communicate directly and securely if
they share a common key. To establish a secure connection between two nodes
without a shared key, a key-path has to be found. The key-path is an overlay
path in which each pair of adjacent nodes have a secure link between them3 , i.e.,
they share a common key. To exchange messages, the source initially encrypts
its message and forwards it to the first hop on the overlay. The message is then
routed over the overlay where each intermediate hop, in turn, decrypts the data,
encrypts it again with a key shared with the next hop, and forwards it to the
next hop toward the destination.
Despite important differences between various classes of key pre-distribution
techniques (such as symmetric and asymmetric cryptosystems) in terms of their
routing mechanisms and the process of forming secure overlays (§2), they fun-
damentally share a security vulnerability, known as intermediate D-E steps or
per hop key exposure [32] where the intermediate nodes on the key-path overlay
can decrypt and encrypt messages. Since an attacker can compromise an in-
termediate node, any decryption-encryption (D-E) step raises a security threat.
While enhancing the link-level security of the key pre-distribution schemes has
been the focus of many recent works [7,23,33,34,11,31], the holistic, end-to-end
security of these schemes is relatively unexplored. In addition to this security
concern, the performance of key pre-distribution schemes is not ideal because
their overlay paths are commonly longer than the physical shortest paths. The
resulted path stretch leads to performance degradation, e.g., increased latency
and network overhead, as we quantify in §4.
3
Note that this secure overlay link may span multiple physical nodes, in reality.
Title Suppressed Due to Excessive Length 3
2 Related Work
Key pre-distribution schemes are categorized into two main categories based on
their underlying cryptosystem, symmetric and asymmetric. In this section, we
provide a brief comparison of these categories, the state-of-the-art techniques
for each, and proposals for secure end-to-end communications using key pre-
distribution in turn.
In this scheme, each keyring is chosen uniformly at random from a key-pool, with
replacement. The main security shortcoming of the Eschenauer-Gligor design is
that if an attacker compromises several nodes, it can access many keys from
the key-pool. Thus, many links inside the network become insecure. Chan et
al. [7] propose Q-composite algorithm to mitigate this security shortcoming by
establishing secure links only between nodes that have at least q common keys.
More recently, the concept of combinatorial block design is used in [6,27]
to build key pre-distribution schemes. Bechkit et al. [6] propose a key pre-
distribution scheme based on unital block design, referred to as naive unital key
pre-distribution (NU-KP). The proposed scheme has a low key-sharing probabil-
ity: O( k1 ). To improve this probability, they suggest to pre-load each node with
t disjoint blocks and refer to the new design as t-UKP. Ruj et al. [27] propose
a method to construct strong Steiner trade (SST), a form of block design, and
use it as a key pre-distribution scheme. SST establishes a unique secret pairwise
key between nodes. It is proven that the probability of sharing such a pairwise
key does not exceed 0.25 [6]. In our evaluations, we implement 2-UKP and SST
as two well-known baseline schemes.
Liu et al. [24] introduce the idea of asymmetric key pre-distribution, relying
on some keying material servers. Multi-hop wireless networks, however, do not al-
ways have access to keying servers. Probabilistic asymmetric key pre-distribution
(PAKP) was subsequently proposed to consider this problem [12]. In this scheme,
each node stores k public keys chosen uniformly at random with replacement,
from a key-pool containing all the public keys. In [12], authors prove that in
PAKP, for any k ≥ 3, the probability of key-path existence is more than 99.9%,
where the impact of increasing the number of nodes is negligible. They further
prove that PAKP reduces the average number of D-E steps to O(log k n). In com-
parison, this number is in the order of the physical path length in symmetric key
pre-distribution schemes. In contrast to the random key distribution, authors of
[13] and [4] propose and analyze several more realistic scenarios for asymmetric
key distribution.
While the general paradigm of key pre-distribution is similar for both categories—
symmetric and asymmetric cryptosystems—the routing policies of these two cat-
egories have significant differences. In symmetric systems, a key-pool containing
all the secret keys is formed. Any node is pre-loaded with a keyring chosen from
the key-pool. During a shared key discovery process, any two adjacent nodes
discover their secure link by checking whether they share a common key or not.
Accordingly, to find a secure path from the source node to the destination, a
physical path is first found. Subsequently, for any physical hop, if there is no
secure link, a key-path is found. The transferred data is then encrypted by the
source node, decrypted and encrypted again by each intermediate node until
reaching the destination.
In asymmetric key pre-distribution, on the other hand, the routing mecha-
nism follows a reverse process: the key-pool is formed by the public keys of all
nodes. Each node is pre-loaded by k public keys chosen uniformly at random
with replacement from the pool. Initially, a key-path from the source node to
6 M. Gharib et. al.
the destination has to be found. Subsequently, for any key-path hop, the corre-
sponding physical path is selected. In this case, each key-path hop may contain
several physical hops without decryption and encryption steps, since the overlay
neighbors may be physically far away. Generally, there are three main differ-
ences between symmetric and asymmetric key pre-distribution schemes. First,
the routing process follows a reverse routing procedure. Second, the distributed
keys are not confidential. Third, the overlay links in asymmetric schemes are
directed.
In a key pre-distribution scheme, regardless of the symmetric or asymmetric
nature of its relaying cryptosystem, there are some intermediate nodes which
decrypt the data, encrypt it again, and forward it toward the destination. Since
the adversary node may forge itself as an intermediate node, any D-E step is
considered as a security threat. Moreover, the resulted path may also be longer
than the shortest physical path, due to the absence of a direct secure link, which
leads to performance degradation. We provide more details about these two
categories of key pre-distribution techniques below.
While the intermediate D-E steps problem was first introduced in [32], this work
does not propose a solution. To the best of our knowledge, the algorithm of
[18] is the first well-defined end-to-end solution for intermediate D-E steps. In
this solution, the source node chooses a pairwise key, splits it into ρ pieces,
and sends each piece via different node-disjoint paths to the destination. In this
way, the attacker needs to compromise at least one node from each node-disjoint
path to retrieve the entire pairwise key and decrypt the data. To improve the
performance of [18], Li et al. [22] suggest using intermediate nodes as proxies,
and then use multiple paths, each path with just one proxy, to send the key
pieces. Gupta et al. [17] propose their algorithm based on [22] by introducing
some proxies as friends. They then use a publicly known function and only the
key pieces of the friends to retrieve the pairwise key. Sheu et al. [28] propose
using a group-based pairwise key to enhance the security of node-disjoint paths.
However, this algorithm requires a group-key agreement. A security shortcoming
shared across all these algorithms is their reliance on sending secret values (e.g.,
private keys) through hop-by-hop D-E steps to establish a pairwise key. The at-
tacker will be able to access these values, and consequently encrypted messages,
via compromising the intermediate nodes. Similar to KPsec, [25] strives to es-
tablish end-to-end secure communications by providing disjoint overlay paths.
Unlike KPsec, however, it relies on a backbone infrastructure.
and efficiently, over shortest paths (phase 3). After presenting an overview of
the algorithm, we analyze its key aspects such as the number and the length of
disjoint key-paths and its resilience against cooperative attacks in turn.
Assumption 2 When there is more than one path toward the destination and
the source node randomly chooses one of them, the attacker cannot guess which
path is chosen.
This polynomial is used for coding where P (0) is the public key of the source
node. The source node calculates P (i), i = 1, 2, . . . , ρ and then calculates sign(P (i))
which is the value of P (i) signed by the private key of the source node. It could
8 M. Gharib et. al.
be used to certify the correctness of the shares. The source node then sends each
tuple (i, P (i), sign(P (i))) from the ith vertex-disjoint overlay path.
Phase 2: In this phase, the destination collects θ shares and forms the set
P. It then calculates the public key of the source node as
X
P (0) = P (i)li , (2)
i∈P
Note that the computational complexity of the mentioned erasure code is O(θ2 ).
If θ = ρ, the Lagrange multipliers become unique and thus each node can simply
store them. In this case, the computational complexity of the code reduces to
O(θ). By calculating the public key of the source node, the destination node
can certify the shares by checking the sign of each share. The destination then
encrypts its own public key with the public key of the source node and sends it
through the shortest physical path. The source node decrypts the destination’s
public key. At this point, both ends have exchanged their public keys.
Phase 3: In principle, the source is now able to communicate with the desti-
nation directly and securely, using asymmetric encryption. However, asymmet-
ric encryption is known to be computationally complex and energy inefficient.
Therefore, it is not an ideal choice for multi-hop wireless networks. KPsec uses
symmetric encryption instead: upon receiving each other’s public key, source and
destination nodes calculate a pairwise key ksd :
ksd = xs .yd = xd .ys . (4)
Since in ECC the corresponding public key for the private key x is calculated
as y = x.G where G is the elliptic cure base point, the pairwise key ksd will
be identical for both the source and the destination nodes. After this step, the
source node can encrypt its data using the pairwise key and then sends it to
the destination via the shortest physical path. The destination can also use the
same key to decrypt the received data.
Title Suppressed Due to Excessive Length 9
KPsec raises a few concerns. Specifically, the first phase of the algorithm relies
on a number of disjoint paths. Its operation, security, and performance, therefore,
hinges on the existence and lengths of such paths. Moreover, the resilience of the
algorithm against cooperative attacks, where the attacker controls a fraction of
all nodes, is not known. In the rest of this section, we perform a comprehensive
analysis to address these concerns.
R = 1 − (1 − (1 − p)#DE )ρ , (5)
where #DE represents the number of intermediate D-E steps in each path.
Proof. In this analysis, each intermediate D-E step is considered as a reliability
threat. Hence, for a path to be reliable, it should be empty of any compromised
node. Hence, the reliability of each path is equal to (1 − p)#DE . The attacker
has to compromise at least an intermediate node from each path to potentially
becomes able to perform a successful attack. The probability of attacker success
in each path is one minus the reliability of that path, i.e. 1 − (1 − p)#DE . For ρ
disjoint paths, hence, the total reliability is equal to
R = 1 − (1 − (1 − p)#DE )ρ . (6)
Fig. (1) shows the quantitative results of Equation (5) for a network with 10%
of nodes being compromised, selected uniformly at random, i.e. p = 0.1. While
increasing the number of paths improves security, Fig. (1) shows that after the
first several paths, the security improvement of adding extra paths is negligible.
To find the set of vertex-disjoint paths between any pair of source and desti-
nation vertices, we use the Ford-Fulkerson max-flow algorithm [19,10]. We know
that the upper bound of the number of vertex-disjoint paths is k, because each
node stores just k keys, i.e. the source node has only k neighbors in the overlay.
The Ford-Fulkerson max-flow algorithm is known as a greedy algorithm capable
of finding the set with the maximum number of edge-disjoint paths. However,
our problem is to find the set of vertex-disjoint paths, not edge-disjoint. To find
such a set, we modify this algorithm by replacing each vertex in our graph with
two vertices which are connected with a directed edge, with a capacity of one.
10 M. Gharib et. al.
0.8 #DE=1
#DE=2
0.7
#DE=4
#DE=6
0.6
#DE=8
0.5 #DE=10
0.4
0.3
1 2 3 4 5 6 7 8 9 10
Number of Disjoint Paths
Lemma 2. Consider directed graph G(V, E), where V and E denote sets of
vertices and edges, respectively, and the capacity of all edges is one. We modify
G to form a new graph G′ (V ′ , E ′ ) by replacing each vertex vi with two vertices
vi1 and vi2 and an edge from vi1 to vi2 with capacity one. Applying the Ford-
Fulkerson algorithm on the modified graph results in a set with maximum number
of vertex-disjoint paths in the main graph.
Proof. Assume, by contradiction, that the result of the Ford-Fulkerson algorithm
on graph G′ does not return the maximum number of vertex-disjoint paths in
graph G. This implies that there is at least a flow in graph G′ which passes
′
through node vi1 and then another node vi2 instead of passing vi2 . This, however,
contradicts our assumption about G since in G′ , there exists only a single edge
′
with capacity one from each node vi1 to vi2 . This is a contradiction and hence the
results of the Ford-Fulkerson algorithm on the graph G′ returns the maximum
number of vertex-disjoint paths in G.
Fig. (2) shows the average number of disjoint paths and the distribution of
their length. Fig. (2a) that includes the results for different numbers of nodes and
different k values shows two important facts. First, the number of vertex-disjoint
paths is very close to the value of k. Second, increasing the number of nodes has
a negligible impact on the number of vertex-disjoint paths. Collectively, Fig. (1)
and Fig. (2a) indicate that, with high probability, there will be enough number
of vertex-disjoint paths for KPsec’s operations.
Fig. (2b) shows the distribution function of disjoint path length for different
k values in a graph with 1000 nodes. This parameter is of paramount importance
for the KPsec algorithm as a performance as well as a security metric. Although
the encrypted data in the proposed algorithm follows the shortest physical path
toward the destination, longer key-path length for vertex-disjoint paths leads to
more network controlling traffic during the key-exchange process. Plus, longer
key-paths mean more intermediate D-E steps and more vulnerability against
cooperative attacks. Fig. (2b) shows that the length of the most vertex-disjoint
paths is very close to the minimum key-path length reported in [12] and increas-
ing the value of k decreases the average key-path length and its variance which
implies that the length of most disjoint key-paths is close to the average length.
While not reported here, we investigate the same scenario for a fix k value and
different numbers of network nodes. The results are similar to those of Fig. (2b).
Title Suppressed Due to Excessive Length 11
24 1
K = 20 K = 40
22 K = 15
Average Number of Vertex-Disjoint Paths
K = 10 K = 20
20 0.8
K=5 K = 10
18
K=5
16
0.6 K=3
CDF
14
12
0.4
10
8
0.2
6
4
0
1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 0 2 4 6 8 10 12 14 16
Number of Nodes Length of Path (n = 1000)
(a) Average number of disjoint paths. (b) Distribution function of path length.
K = 15 2.5 K = 15
15 K = 10 K = 10
K=5 2 K=5
10 1.5
1
5
0.5
0 0
0 10 20 30 40 50 0 10 20 30 40 50
Ratio of Adversary Nodes (n = 1000) Ratio of Adversary Nodes (n = 1000)
(a) Average number of secure paths. (b) The standard deviation of the number of
secure paths.
cessful attack. Considering the results of Fig. (3) for different values of k, we
can conclude that for θ = c1 ρ, the attacker always needs to compromise c2 n
nodes to perform a successful attack, where c1 and c2 are scaling constants, i.e.
0 < c1 , c2 < 1. Hence, the attacker needs to compromise O(n) nodes, even for
small θ values.
In our 10-node testbed experiment, each node stores 3 keys where two disjoint
paths are used for the key exchange process. We used 10 laptops to perform the
experiment by connecting them in an ad-hoc mode via a 5 Megahertz (MHz)
wireless channel, 2.412-2.417 GHz. In each scenario, a 5 Megabytes (MB) file is
sent from a specific source node to a specific destination. To make a fair compari-
son, we considered the same physical arrangement for all scenarios. We measured
the time of the key-exchange process and the time between sending the first data
packet by the source and receiving the last packet by the destination. The over-
all end-to-end latency is the summation of these times. We further measured
the control traffic required for the key-exchange process in each algorithm. The
Title Suppressed Due to Excessive Length 13
throughput is also measured as the packet delivery ratio over the bandwidth.
Table (2) shows the result of our testbed experiments.
Due to the low key-sharing probability of SST (discussed in §2), the key-path
in this scheme is significantly longer than other schemes. This fact leads to longer
key exchange delay and higher key exchange traffic. Since, in all cases, the data
follows the shortest physical path to reach the destination, the data transmission
latency and throughput are expected to yield similar results. However, due to
the network traffic and latency caused by the key-exchange process, we observe
lower throughput for the augmented SST algorithm.
1.2 1.15
KPsec KPsec
1.15
Aug. UKP 1.1 Aug. UKP
1.1 Aug. SST Aug. SST
1.05
Throughput (Mbps)
Throughput (Mbps)
2-UKP 2-UKP
1.05
PAKP 1 PAKP
1
SST SST
0.95
0.95
0.9
0.9
0.85
0.85
0.8 0.8
100 120 140 160 180 200 10 12 14 16 18 20
average routing traffic per connection, the key-exchange routing traffic, and
the consumed energy as performance evaluation metrics. Fig. (4) compares the
throughput of different scenarios. While Fig. (4a) shows the average through-
put for 10 fixed connections and the different number of nodes, Fig. (4b) shows
the results for different numbers of connections in a 100-nodes setting. Since in-
creasing the number of connections increases congestion, the network through-
put is slightly decreased as the number of connections increases. We observe
that the factor that impacts the network throughput the most is the physical
path length. Since, in end-to-end solutions, the data traffic follows the shortest
physical path, KPsec’s throughput is higher in comparison with SST, 2-UKP,
and simple PAKP, as shown in Fig. (4). It is worth noting that augmented SST
and augmented UKP have similar throughput as KPsec. Since 2-UKP has a
significantly higher number of overlay edges, it has the shortest physical path
among the compared schemes. This fact leads to 2-UKP outperforming other key
pre-distribution schemes. An improvement of more than 7.5% is also notable for
KPsec compared to PAKP.
We next measure the average end-to-end latency per connection. Each con-
nection starts at a time randomly chosen within the interval [0, 60] seconds. The
end-to-end latency for each connection ends when the destination receives the
last packet of the file. The average latency per connection is shown in Fig. (5) for
different numbers of nodes and connections. Consistent with our testbed results,
all the end-to-end solutions exhibit similar performance. KPsec shows significant
improvement of more than 50% compared to SST, 2-UKP, and PAKP. While
PAKP slightly improves the performance compared to SST, 2-UKP outperforms
both of them.
We also measure the key-exchange delay. Fig. (6) shows the results for dif-
ferent numbers of nodes and connections. Recall that the key-exchange process
in KPsec has one additional step in comparison with the algorithm of [18]. In
KPsec, after receiving key shares, the destination node encrypts its public key
and sends it to the source node. This extra step imposes some delay which leads
to augmented UKP outperforming KPsec for this metric. However, the longer
key-path in SST increases the augmented SST key-exchange’s delay.
Title Suppressed Due to Excessive Length 15
9000
6000
SST SST
8000
PAKP PAKP
2-UKP 2-UKP
End-to-End Latency (Sec)
KPsec KPsec
6000
4000 Aug. SST Aug. SST
Aug. UKP 5000 Aug. UKP
3000
4000
2000 3000
2000
1000
1000
100 120 140 160 180 200 10 12 14 16 18 20
500 900
KPsec KPsec
450 Aug. SST 800 Aug. SST
Key-Exchange Delay (Sec)
Key-Exchange Delay(Sec)
Aug. UKP Aug. UKP
400 700
350 600
300 500
250 400
200 300
150 200
100 120 140 160 180 200 10 12 14 16 18 20
We next measure the routing traffic overhead generated for sending the en-
crypted 5MB files. Fig. (7) shows this parameter measured in MB. Again, a
longer physical path degrades this parameter for both SST and augmented SST.
Fig. (8) shows the key-exchange traffic for end-to-end algorithms. This figure
shows that KPsec and augmented UKP generate almost similar volumes of key-
exchange traffic which is lower than augmented SST. While not shown here,
a network with stationary nodes is also simulated. The results show the same
pattern for all the mentioned parameters. However, for routing traffic, the net-
work with stationary node shows an average of 9% less overall routing traffic
and 11.5% less key-exchange traffic overhead. We have used the setting of [26]
to calculate the consumed energy for encryption and decryption processes in
our simulations. Fig. (9) shows the results for a network with different numbers
of nodes. Since PAKP encrypts data asymmetrically, it consumes an order of
magnitude more energy in comparison with other algorithms. Thus, we remove
its curve for better representation. The SST scheme has more intermediate D-E
steps in comparison with 2-UKP. Thus, it consumes energy at a rate almost twice
as large as that of 2-UKP. KPsec, in turn, outperforms the key pre-distribution
schemes by more than 70%. Since the data transmission process in all end-to-
end algorithms follows the shortest physical path and all of them use symmetric
encryption, their performance with respect to this metric is similar.
16 M. Gharib et. al.
SST SST
10 Aug. SST Aug. SST
6
PAKP KPsec
Routing Traffic (MB)
4 3
2 2
5 3
2
3
2.5
1.5
1.5
1
0.5 0.5
100 120 140 160 180 200 10 12 14 16 18 20
Overall, our results show that despite the fact that end-to-end solutions in-
cluding KPsec add some delay and traffic overhead, they remove the path stretch
and consequently result in better overall performance. They also show that, while
the performance of [18] depends on its underlying key pre-distribution scheme,
generally it is close to KPsec, performance-wise. However, in the following part,
we show that KPsec has significant security advantages over [18].
3500
SST
3000 2-UKP
Energy Consumption (Jule)
KPsec
2500
Aug. SST
2000 Aug. UKP
1500
1000
500
0
100 120 140 160 180 200
Number of Nodes
8 SST
7
PAKP
0.8
6
0.7 KPsec
5
Aug. UKP
0.6
4 Aug. SST
0.5
3
2 0.4
1 0.3
100 120 140 160 180 200 1 2 3 4 5 6 7 8 9 10
(a) Average number of D-E steps. (b) Resiliency against cooperative attacks.
Fig. 10. Average number of D-E steps and its effect on the network resiliency.
We first measure the average intermediate D-E steps in each disjoint path, as a
basic security metric. Fig. (10a) shows this parameter for different schemes. This
figure shows that the number of intermediate D-E steps in the KPsec algorithm
is significantly lower than those of augmented SST and augmented UKP. While
we represented a general analysis for resiliency against cooperative attacks in
Fig. (1), we combine the results of Fig. (10a) with the mentioned analysis to
show the resiliency of different algorithms. Fig. (10b) shows the results for a
network with 100 nodes, 10% of them being compromised, and different numbers
of disjoint paths. As Fig. (10b) shows, KPsec approaches to perfect resiliency
with only three disjoint paths, while this number is 5 and 8 for augmented
UKP and augmented SST, respectively. That is, KPsec can use a lower number
of disjoint paths to achieve higher performance for the same level of resiliency
against cooperative attacks.
One of the main advantages of KPsec is its resiliency against passive at-
tacks such as eavesdropping. Since all transferred keys in KPsec are public, an
attacker cannot degrade the computational hardness of the cryptosystem and
consequently cannot compromise the secrecy of data transmission, by eavesdrop-
ping. In contrast, a large enough number of compromised nodes in augmented
SST and augmented UKP enable the attacker to access the pairwise key only
by eavesdropping. Even if the attacker cannot eavesdrop all the key pieces in
18 M. Gharib et. al.
the algorithm of [18], it can access some key pieces and generate other parts
by a brute-force search. By considering the fact that the computational hard-
ness of symmetric cryptosystems exponentially increases by the increment of
key length [3], knowing any portion of the key is equivalent to the shorter key
length, and hence, it logarithmically decreases the computational complexity of
the brute-force attack [8]. In other words, the algorithm of [18] suffers from secure
information leakage. The next advantage of KPsec over symmetric end-to-end
solutions is the geographical distance of its overlay neighbors. In symmetric so-
lutions, the attacker can perform a jamming attack and force the source node
to establish its connection through a specific neighbor that the attacker desires
(i.e., a compromised node). In KPsec, by contrast, since the overlay neighbors
are, in most cases, physically far away and the physical neighbors carry only
encrypted messages, this attack becomes ineffective.
The next important security metric is the number of nodes that an attacker
needs to capture in order to compromise the security of the network as a whole.
This metric is sometimes referred to as the resiliency against selective node
capture (SNC) attacks. In symmetric key pre-distribution schemes, the key-pool
includes a limited number of secret keys. Hence, if the attacker knows about the
keyring arrangement, it can selectively capture√nodes to get access to the entire
key-pool. In 2-UKP and SST, this number is O( n) and O(k) nodes, respectively
[16]. Under PAKP, by capturing each node, the attacker accesses only several
public keys and only one private key. Hence, the attacker needs to capture O(n)
nodes to access all private keys. Table (3) summarizes and compares the security
of these schemes for a network with 100 nodes and three disjoint paths.
5 Conclusion
References
1. Standards for efficient cryptography, SEC 1: Elliptic Curve Cryptography. Certi-
com Research (2009)
2. (2014), http://www.isi.edu/nsnam/ns/
3. Recommendation for key management part 1: General. NIST Special Publication
800-57 Part 1 Revision 4 (2016)
4. Ahmadi, M., Gharib, M., Ghassemi, F., Movaghar, A.: Probabilistic key pre-
distribution for heterogeneous mobile ad hoc networks using subjective logic. In:
2015 IEEE 29th International Conference on Advanced Information Networking
and Applications. pp. 185–192 (March 2015)
5. Au, T.C., Zhang, S., Stone, P.: Autonomous intersection management for semi-
autonomous vehicles. In: Teodorovi’c, D. (ed.) Handbook of Transportation, pp.
88–104. Routledge (2016)
6. Bechkit, W., Challal, Y., Bouabdallah, A., Tarokh, V.: A highly scalable key pre-
distribution scheme for wireless sensor networks. Wireless Communications, IEEE
Transactions on 12(2), 948–959 (February 2013)
7. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor
networks. In: Security and Privacy, 2003. Proceedings. 2003 Symposium on. pp.
197–213 (May 2003)
8. Curtin, M.: Brute Force Cracking the Data Encryption Standard. Springer (2005)
9. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor
networks. In: Proceedings of the 9th ACM Conference on Computer and Commu-
nications Security. pp. 41–47. CCS ’02, ACM, New York, NY, USA (2002)
10. Ford, L.R.J., Fulkerson, D.R.: Maximal flow through a network. Canadian Journal
of Mathematics 8(1), 399404 (1956)
11. Gandino, F., Ferrero, R., Rebaudengo, M.: A key distribution scheme for mo-
bile wireless sensor networks: q - s -composite. IEEE Transactions on Information
Forensics and Security 12(1), 34–47 (Jan 2017)
12. Gharib, M., Emamjomeh-Zadeh, E., Norouzi-Fard, A., Movaghar, A.: A novel prob-
abilistic key management algorithm for large-scale manets. In: 2013 27th Interna-
tional Conference on Advanced Information Networking and Applications Work-
shops. pp. 349–356 (March 2013)
13. Gharib, M., Minaei, M., Golkari, M., Movaghar, A.: Expert key selection impact
on the manets’ performance using probabilistic key management algorithm. In:
Proceedings of the 6th International Conference on Security of Information and
Networks. pp. 347–351. SIN ’13, ACM, New York, NY, USA (2013)
14. Gharib, M., Yousefi’zadeh, H., Movaghar, A.: Secure overlay routing for large scale
networks. IEEE Transactions on Network Science and Engineering 6(3), 501–511
(July 2019). https://doi.org/10.1109/TNSE.2018.2812830
15. Gharib, M., Moradlou, Z., Doostari, M.A., Movaghar, A.: Fully distributed ecc-
based key management for mobile ad hoc networks. Computer Networks 113, 269
– 283 (2017). https://doi.org/https://doi.org/10.1016/j.comnet.2016.12.017
16. Gharib, M., Yousefi’zadeh, H., Movaghar, A.: Secure overlay routing using key
pre-distribution: A linear distance optimization approach. IEEE Transactions on
Mobile Computing 15(9), 2333–2344 (Sep 2016)
17. Gupta, A., Kuri, J., Nuggehalli, P.: A new scheme for establishing pairwise keys
for wireless sensor networks. In: Chaudhuri, S., Das, S.R., Paul, H.S., Tirthapura,
S. (eds.) Distributed Computing and Networking. pp. 522–533. Springer Berlin
Heidelberg, Berlin, Heidelberg (2006)
20 M. Gharib et. al.
18. Hui Ling, Znati, T.: End-to-end pairwise key establishment using multi-
path in wireless sensor network. In: GLOBECOM ’05. IEEE Global
Telecommunications Conference, 2005. vol. 3, pp. 5 pp.– (Nov 2005).
https://doi.org/10.1109/GLOCOM.2005.1577968
19. L. R. Ford, J., Fulkerson, D.R.: Flows in Networks. PRINCETON UNIVERCITY
PRESS (2010)
20. Lee, E.A.: Cyber physical systems: Design challenges. In: 2008 11th
IEEE International Symposium on Object and Component-Oriented
Real-Time Distributed Computing (ISORC). pp. 363–369 (May 2008).
https://doi.org/10.1109/ISORC.2008.25
21. Lee, E.A., Seshia, S.A.: Introduction to Embedded Systems, A Cyber-Physical
Systems Approach. LeeSeshia.org (2011)
22. Li, G., Ling, H., Znati, T.: Path key establishment using multiple secured paths in
wireless sensor networks. In: Proceedings of the 2005 ACM Conference on Emerging
Network Experiment and Technology. pp. 43–49. CoNEXT ’05, ACM, New York,
NY, USA (2005). https://doi.org/10.1145/1095921.1095928
23. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In:
Proceedings of the 10th ACM Conference on Computer and Communications Se-
curity. pp. 52–61. CCS ’03, ACM, New York, NY, USA (2003)
24. Liu, Z., Ma, J., Huang, Q., Moon, S.: Asymmetric key pre-distribution scheme for
sensor networks. IEEE Transactions on Wireless Communications 8(3), 1366–1372
(March 2009). https://doi.org/10.1109/TWC.2009.080049
25. Obenshain, D., Tantillo, T., Babay, A., Schultz, J., Newell, A., Hoque, M.E., Amir,
Y., Nita-Rotaru, C.: Practical intrusion-tolerant networks. In: 2016 IEEE 36th
International Conference on Distributed Computing Systems (ICDCS). pp. 45–56
(June 2016). https://doi.org/10.1109/ICDCS.2016.99
26. Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.: A study of the energy con-
sumption characteristics of cryptographic algorithms and security protocols. Mo-
bile Computing, IEEE Transactions on 5(2), 128–143 (Feb 2006)
27. Ruj, S., Nayak, A., Stojmenovic, I.: Fully secure pairwise and triple key distribu-
tion in wireless sensor networks using combinatorial designs. In: INFOCOM, 2011
Proceedings IEEE. pp. 326–330 (April 2011)
28. Sheu, J.P., Cheng, J.C.: Pair-wise path key establishment in wireless sensor net-
works. Computer Communications 30(11), 2365 – 2374 (2007), special issue on
security on wireless ad hoc and sensor networks
29. Trivedi, K.: Probability and Statistics with Reliability, Queuitgo and Computer
Science Applications. Wiley-Interscience Publication (2002)
30. www.nhtsa.gov: Frequency of target crashes for intellidrive safety systems. US
Department of Administration (2010)
31. Yagan, O., Makowski, A.M.: Wireless sensor networks under the random pair-
wise key predistribution scheme: Can resiliency be achieved with small key rings?
IEEE/ACM Transactions on Networking 24(6), 3383–3396 (December 2016)
32. Yun Zhou, Yanchao Zhang, Yuguang Fang: Llk: a link-layer key establishment
scheme for wireless sensor networks. In: IEEE Wireless Communications and Net-
working Conference, 2005. vol. 4, pp. 1921–1926 Vol. 4 (March 2005)
33. Zhao, J.: On resilience and connectivity of secure wireless sensor networks under
node capture attacks. IEEE Transactions on Information Forensics and Security
12(3), 557–571 (March 2017). https://doi.org/10.1109/TIFS.2016.2613841
34. Zhao, J.: Topological properties of secure wireless sensor networks under the q
-composite key predistribution scheme with unreliable links. IEEE/ACM Transac-
tions on Networking 25(3), 1789–1802 (June 2017)