KPsec: Secure End-to-End Communications for Multi-Hop Wireless Networks

11/12/2019
by   Mohammed Gharib, et al.
0

The security of cyber-physical systems, from self-driving cars to medical devices, depends on their underlying multi-hop wireless networks. Yet, the lack of trusted central infrastructures and limited nodes' resources make securing these networks challenging. Recent works on key pre-distribution schemes, where nodes communicate over encrypted overlay paths, provide an appealing solution because of their distributed, computationally light-weight nature. Alas, these schemes share a glaring security vulnerability: the two ends of every overlay link can decrypt—and potentially modify and alter—the message. Plus, the longer overlay paths impose traffic overhead and increase latency. We present a novel routing mechanism, KPsec, to address these issues. KPsec deploys multiple disjoint paths and an initial key-exchange phase to secure end-to-end communications. After the initial key-exchange phase, traffic in KPsec follows the shortest paths and, in contrast to key pre-distribution schemes, intermediate nodes cannot decrypt it. We measure the security and performance of KPsec as well as three state-of-the-art key pre-distribution schemes using a real 10-node testbed and large-scale simulations. Our experiments show that, in addition to its security benefits, KPsec results in 5-15% improvement in network throughput, up to 75% reduction in latency, and an order of magnitude reduction in energy consumption.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/12/2018

Multi-Hop Routing in Covert Wireless Networks

In covert communication, Alice tries to communicate with Bob without bei...
research
05/06/2022

Analysis of Multiple Overlapping Paths algorithms for Secure Key Exchange in Large-Scale Quantum Networks

Quantum networks open the way to an unprecedented level of communication...
research
02/01/2018

Throughput Analysis of IEEE 802.11 Multi-hop Wireless Networks with Routing Consideration: A General Framework

The end-to-end throughput of multi-hop communication in wireless ad hoc ...
research
12/28/2017

TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks

Wireless Mesh Networks (WMNs) have emerged as a key technology for the n...
research
04/12/2020

How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

Three closely-related polynomial-based group key pre-distribution scheme...
research
01/12/2023

Jamming Attacks on Decentralized Federated Learning in General Multi-Hop Wireless Networks

Decentralized federated learning (DFL) is an effective approach to train...
research
07/20/2023

Data-Driven Latency Probability Prediction for Wireless Networks: Focusing on Tail Probabilities

With the emergence of new application areas, such as cyber-physical syst...

Please sign up or login with your details

Forgot password? Click here to reset