首页    期刊浏览 2024年11月28日 星期四
登录注册

文章基本信息

  • 标题:Stochastic Analysis and Modeling of a Tree-Based Group Key Distribution Method in Tactical Wireless Networks
  • 作者:Peter Bajorski ; Alan Kaminsky ; Michael Kurdziel
  • 期刊名称:Telecommunications System & Management
  • 电子版ISSN:2167-0919
  • 出版年度:2014
  • 卷号:3
  • 期号:2
  • 页码:1-9
  • DOI:10.4172/2167-0919.1000115
  • 出版社:OMICS Group
  • 摘要:A number of key management challenges are encountered when operating tactical communication systems using a group-wide shared key. A large portion of such communications occurs over low bit-rate channels, and all communication channels must be available at any moment for mission action. Current over-the-air rekeying protocols consume too much channel bit-rate to be practical for large tactical radio networks. This caused an off-line pre-placed key (PPK) approach to become most commonly used key distribution method in these environments. Unfortunately, with this key management scheme, revoking group membership requires a full intra-mission rekey, which can be dangerous in a battlefield situation. This paper introduces a new group key distribution method called Viral Electronic Key Exchange (VEKE). This paper examines the protocol as an extension to the Internet Key Exchange (IKE) protocol, but any electronic key exchange protocol can be used (Ex. IKE v2). A feature of this protocol is a parallel key distribution scheme enabled by propagating the key management role to authenticated nodes while establishing security associations across the network. We performed a comprehensive stochastic analysis to develop a model for computing the expected rekey time across the entire group, taking into account the likelihood of node jamming, channel failures, and message corruption. This model was verified with a Monte-Carlo simulation. Our results confirmed that the VEKE protocol can accomplish an over-the-air rekey in a short period of time, even over low bit-rate systems, while preserving rigid security and channel availability properties of the network. It also allows for the amount of pre-placed public-key material and other preparations necessary in tactical networks to be minimized.
Loading...
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有