{"title":"Spraying Techniques for Securing Key Exchange in Large Ad-hoc Networks","authors":"Ariel Stulman, A. Stulman","doi":"10.1145/2815317.2815324","DOIUrl":null,"url":null,"abstract":"Massive ad-hoc mobile networks with fluctuating topologies, as is expected for the Internet of Things (IoT), vehicular networks (VANETs), and others, allow for new solutions for the initial key exchange problem. Spraying data on multiple paths is a novel algorithm for confidential key exchange over public, insecure mobile ad-hoc network. It assumes neither prior knowledge nor a trusted third party. It is based on the inherent fluctuating topology of such networks. By spraying the key exchange packets over multiple fluctuating paths, an adversary's ability of attacking a communication link is greatly diminished; thus, active attackers are turned passive. In this paper, two spraying techniques are compared using multiple simulations on random network topologies. The results show that for small networks one technique surpasses the other, but as the network grows - as is expected in IoT, smart cities, VANETs, etc. - this advantage is diminished.","PeriodicalId":120398,"journal":{"name":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","volume":"197 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2815317.2815324","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Massive ad-hoc mobile networks with fluctuating topologies, as is expected for the Internet of Things (IoT), vehicular networks (VANETs), and others, allow for new solutions for the initial key exchange problem. Spraying data on multiple paths is a novel algorithm for confidential key exchange over public, insecure mobile ad-hoc network. It assumes neither prior knowledge nor a trusted third party. It is based on the inherent fluctuating topology of such networks. By spraying the key exchange packets over multiple fluctuating paths, an adversary's ability of attacking a communication link is greatly diminished; thus, active attackers are turned passive. In this paper, two spraying techniques are compared using multiple simulations on random network topologies. The results show that for small networks one technique surpasses the other, but as the network grows - as is expected in IoT, smart cities, VANETs, etc. - this advantage is diminished.