Nothing Special   »   [go: up one dir, main page]

Skip to main content

Secure Intermediary Caching in Mobile Wireless Networks Using Asymmetric Cipher Sequences Based Encryption

  • Conference paper
Mobile Ad-Hoc and Sensor Networks (MSN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4864))

Included in the following conference series:

Abstract

The use of proxies is commonplace in today’s MANETs, where they are used for a huge variety of network services. However the main problem of using proxies is that the end-to-end nature of the communication is broken. This leads to some severe security problems. One of the main questions that arise is how content caching by intermediaries can be done when end-to-end security is required.

In this paper, we will address the research issues of when and how end-to-end security, like confidentiality and authenticity can be preserved, in mobile ad hoc network communications, when having one or more cache proxies and router nodes in the data path.

We propose a solution for an encryption scheme based on Asymmetric Cipher Sequence which allows to an intermediary nodes to cache data and convert the ciphertext for one person into the ciphertext for another person without revealing the secret decryption keys or the plaintext.

Implementation results shows that we can simultaneously achieve high encryption through a wireless links.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bresson, E., Chevassut, O., Pointcheval, D.: A Security Solution for IEEE 802.11s Ad-hoc Mode: Password-Authentication and Group-Diffie-Hellman Key Exchange. International Journal of Wireless and Mobile Computing  (2005)

    Google Scholar 

  2. Burnside, M., Clarke, D., Mills, T., Maywah, A., Devadas, S., Rivest, R.: Proxy-based security protocols in networked mobile devices. In: Proceedings of the 2002 ACM symposium on Applied computing, pp. 265–272 (2002)

    Google Scholar 

  3. Buttyán, L., Vajda, I.: Towards provable security for ad hoc routing protocols. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 94–105 (2004)

    Google Scholar 

  4. Endler, M., Rubinsztejn, H., da Rocha, R., do Sacramento Rodrigues, V.: Proxy-based Adaptation for Mobile Computing. In: PUC (2005)

    Google Scholar 

  5. Huang, C., Lee, C.: Layer 7 Multimedia Proxy Handoff Using Anycast/Multicast in Mobile Networks. IEEE Transactions on Mobile Computing 6(4) (2007)

    Google Scholar 

  6. Kachirski, O., Guha, R.: Effective intrusion detection using multiple sensors in wireless ad hoc networks. In: Proceedings of the 36th Annual Hawaii International Conference on System Sciences, p. 8 (2003)

    Google Scholar 

  7. Lampson, B., Rivest, R.: SDSI| a simple distributed security infrastructure. In: DIMACS Workshop on Trust Management in Networks, South Plainfield, NJ (September 1996)

    Google Scholar 

  8. Liu, J., Xu, J.: Proxy caching for media streaming over the Internet. Communications Magazine 42(8), 88–94 (2004)

    Article  MathSciNet  Google Scholar 

  9. Molva, R., Pannetrat, A.: Scalable Multicast Security with Dynamic Recipient Groups. ACM Transactions on Information and System Security 3(3), 136–160 (2000)

    Article  Google Scholar 

  10. Pearce, C., Ma, V., Bertok, P.: A Secure Communication Protocol for Ad-Hoc Wireless Sensor Networks. In: IEEE International Conference on Intelligent Sensors, Sensor Networks & Information Processions, Melbourne, Australia (2004)

    Google Scholar 

  11. Rejaie, R., Yu, H., Handley, M., Estrin, D.: Multimedia proxy caching mechanism for quality adaptive streamingapplications in the Internet. In: Proceedings Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE, p. 2 (2000)

    Google Scholar 

  12. Vaidya, N.: Mobile Ad Hoc Networks: Routing, MAC, and Transport Issues. In: ACM MOBICOM 2001, tutorial (2001)

    Google Scholar 

  13. Van Der Merwe, J., Dawoud, D., McDonald, S.: A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Surveys 39(1) (2007)

    Google Scholar 

  14. Yeun, S., Lui, J., Yau, D.: A multi key secure multimedia using asymmetric reversible parametric sequences: theory, design, and implementation. IEEE Transactions on Multimedia 7(2), 330–338 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hongke Zhang Stephan Olariu Jiannong Cao David B. Johnson

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kaced, A.R., Moissinac, JC. (2007). Secure Intermediary Caching in Mobile Wireless Networks Using Asymmetric Cipher Sequences Based Encryption. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_66

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77024-4_66

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77023-7

  • Online ISBN: 978-3-540-77024-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics