TY - JOUR
T1 - Collaborative authentication in decentralized dense mobile networks with key predistribution
AU - Zha, Xuan
AU - Ni, Wei
AU - Zheng, Kangfeng
AU - Liu, Ren Ping
AU - Niu, Xinxin
PY - 2017/10/1
Y1 - 2017/10/1
N2 - Challenges of authentication in decentralized mobile networks arise from frequently changing topologies and unreliable contention-based transmissions. We propose a new protocol to speed up authentications, reduce communication costs, and support opportunistic routing under fast-changing topologies. Key pairs are predistributed across the network. Nodes that predistributed the same pair can instantly verify and route messages for each other in an opportunistic and cooperative fashion, combating fast-changing topologies. We also enable a node to increasingly combine unauthenticated messages and a new message for signature or message authentication code generation, while trying different keys on-the-fly. The messages can be verified altogether, once a key is matched. The communication overhead, thus, becomes independent of the number of keys tried. Closed-form expressions for authentication rate, delay, and throughput are derived through a new three-dimensional Markov model. Validated by simulations, analytical results corroborate the robustness of the proposed protocol against changing topologies, as well as the substantially improved resistance to collusion attacks, as compared with the state of the art.
AB - Challenges of authentication in decentralized mobile networks arise from frequently changing topologies and unreliable contention-based transmissions. We propose a new protocol to speed up authentications, reduce communication costs, and support opportunistic routing under fast-changing topologies. Key pairs are predistributed across the network. Nodes that predistributed the same pair can instantly verify and route messages for each other in an opportunistic and cooperative fashion, combating fast-changing topologies. We also enable a node to increasingly combine unauthenticated messages and a new message for signature or message authentication code generation, while trying different keys on-the-fly. The messages can be verified altogether, once a key is matched. The communication overhead, thus, becomes independent of the number of keys tried. Closed-form expressions for authentication rate, delay, and throughput are derived through a new three-dimensional Markov model. Validated by simulations, analytical results corroborate the robustness of the proposed protocol against changing topologies, as well as the substantially improved resistance to collusion attacks, as compared with the state of the art.
KW - decentralized mobile network
KW - authentication
KW - key predistribution
KW - opportunistic routing
KW - Markov model
UR - http://www.scopus.com/inward/record.url?scp=85021636961&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2017.2705584
DO - 10.1109/TIFS.2017.2705584
M3 - Article
AN - SCOPUS:85021636961
SN - 1556-6013
VL - 12
SP - 2261
EP - 2275
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 10
M1 - 7931680
ER -