Abstract
The use of proxies is commonplace in today’s MANETs, where they are used for a huge variety of network services. However the main problem of using proxies is that the end-to-end nature of the communication is broken. This leads to some severe security problems. One of the main questions that arise is how content caching by intermediaries can be done when end-to-end security is required.
In this paper, we will address the research issues of when and how end-to-end security, like confidentiality and authenticity can be preserved, in mobile ad hoc network communications, when having one or more cache proxies and router nodes in the data path.
We propose a solution for an encryption scheme based on Asymmetric Cipher Sequence which allows to an intermediary nodes to cache data and convert the ciphertext for one person into the ciphertext for another person without revealing the secret decryption keys or the plaintext.
Implementation results shows that we can simultaneously achieve high encryption through a wireless links.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bresson, E., Chevassut, O., Pointcheval, D.: A Security Solution for IEEE 802.11s Ad-hoc Mode: Password-Authentication and Group-Diffie-Hellman Key Exchange. International Journal of Wireless and Mobile Computing (2005)
Burnside, M., Clarke, D., Mills, T., Maywah, A., Devadas, S., Rivest, R.: Proxy-based security protocols in networked mobile devices. In: Proceedings of the 2002 ACM symposium on Applied computing, pp. 265–272 (2002)
Buttyán, L., Vajda, I.: Towards provable security for ad hoc routing protocols. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 94–105 (2004)
Endler, M., Rubinsztejn, H., da Rocha, R., do Sacramento Rodrigues, V.: Proxy-based Adaptation for Mobile Computing. In: PUC (2005)
Huang, C., Lee, C.: Layer 7 Multimedia Proxy Handoff Using Anycast/Multicast in Mobile Networks. IEEE Transactions on Mobile Computing 6(4) (2007)
Kachirski, O., Guha, R.: Effective intrusion detection using multiple sensors in wireless ad hoc networks. In: Proceedings of the 36th Annual Hawaii International Conference on System Sciences, p. 8 (2003)
Lampson, B., Rivest, R.: SDSI| a simple distributed security infrastructure. In: DIMACS Workshop on Trust Management in Networks, South Plainfield, NJ (September 1996)
Liu, J., Xu, J.: Proxy caching for media streaming over the Internet. Communications Magazine 42(8), 88–94 (2004)
Molva, R., Pannetrat, A.: Scalable Multicast Security with Dynamic Recipient Groups. ACM Transactions on Information and System Security 3(3), 136–160 (2000)
Pearce, C., Ma, V., Bertok, P.: A Secure Communication Protocol for Ad-Hoc Wireless Sensor Networks. In: IEEE International Conference on Intelligent Sensors, Sensor Networks & Information Processions, Melbourne, Australia (2004)
Rejaie, R., Yu, H., Handley, M., Estrin, D.: Multimedia proxy caching mechanism for quality adaptive streamingapplications in the Internet. In: Proceedings Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE, p. 2 (2000)
Vaidya, N.: Mobile Ad Hoc Networks: Routing, MAC, and Transport Issues. In: ACM MOBICOM 2001, tutorial (2001)
Van Der Merwe, J., Dawoud, D., McDonald, S.: A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Surveys 39(1) (2007)
Yeun, S., Lui, J., Yau, D.: A multi key secure multimedia using asymmetric reversible parametric sequences: theory, design, and implementation. IEEE Transactions on Multimedia 7(2), 330–338 (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kaced, A.R., Moissinac, JC. (2007). Secure Intermediary Caching in Mobile Wireless Networks Using Asymmetric Cipher Sequences Based Encryption. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_66
Download citation
DOI: https://doi.org/10.1007/978-3-540-77024-4_66
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77023-7
Online ISBN: 978-3-540-77024-4
eBook Packages: Computer ScienceComputer Science (R0)