Addressing Key Management Challenges in Ad Hoc Networks
Ad hoc networks can be defined as a decentralized form of wireless networks that allows each device, or each node, to act as a router, forwarding data for other nodes. These networks are utilized where infrastructures either aren’t available or practical to deploy including in military uses, recovery from disasters, and sensor applications. One of the entral paradigms of ad hoc network security is key management, a process of generation, deployment, and administration of cryptographic keys that underlie communication data protection. However, as keys are managed in ad hoc networks creating key management procedure is novel due to the decentralized, dynamic, and resource limited characteristicsof ad hoc networks.
1. Absence of a central platform
➢ The lack of a centralized control structure is a major problem in ad hoc networks in that there is no CA available for purchasing and issuing cryptographic keys. In conventional networks, a CA is an authentication authority which also vouches for the nodes and securely delivers the keys. Nonetheless, in ad hoc networks, it is hard to maintain and manage cryptographic keys, in particular there is no centralized infrastructure that can allow checking nodes that joins the network with the aim of putting them in black list and launching attacks, for example man-in the-middle attack.
➢ In response to this, decentralized key management schemes are usually suggested.
These schemes divide the significant functions of key management amongst the nodes, so that none of the node is overloaded and becomes a threat to the whole network. There is for instance the threshold cryptography where the secret key is partitioned such that a certain number of nodes have to work together in order to reconstruct it. Per this note it gives robustness and also protect the network from being compromised through a single node.
2. Dynamic Topology
➢ Multipoint Communication systems and ad hoc networks are generally conducted with highly changeable topographies because nodes are participating inconsistently, connecting, disconnecting, and rerouting. This frequency causes great difficulty in key management because keys must be updated and redeployed constantly to ensure secure transmissions. Conventional extensible key management systems developed for static networks are incapable of handling change.
➢ This problem can be solved by self-organized key management protocols for the fact that ad hoc networks are dynamic in nature. These protocols enable nodes make local key management and distribution decisions based on the current underlying network conditions. For instance, a node may agree this with another node at first meeting and later use mobility patterns to update keys periodically. These dynamic. key management schemes also guarantee security of node communication even when the network topology is in transition.
3. Resource Constraints
➢ adhoc networks can be deployed in many environments where devices are constrained in terms of power, memory and processing capacity. Crypto-primitive can be complicated to execute reliable cryptographic algorithms for key management that can significantly utilize the limited resources of nodes and take much energy, especially if they are sensor batteries. This resource constraint brings a question in the conservation of security and efficiency balance.
➢ To counter this, the use of lightweight cryptographic algorithms in ad hoc networks is very widespread. Many of these algorithms are designed to offer reasonable levels of security while incurring relatively little computational or energy cost. Third, it’s possible to apply selective encryption, meaning that critical data only is encrypted; the current cryptographic load on the nodes is thus minimizes.
4. Node Authentication and trust establishment
➢ Authentication is required in Ad-hoc Network because if wrong nodes are allowed to get into the network then wrong nodes can attack the network. Nonetheless, its lack of a coordinating authority leads to the creation of a problem of trust between nodes. Different approaches to trust management in ad hoc networks concern peer-to-peer relationships and frequently expect the nodes to make decisions regarding the trustworthiness of different neighbours based on their actions in the past.
➢ In this regard, the use of reputation-based trust models can be made as the solutions to the challenge. In such models, nodes observe the behaviour of its neighbours and rewards them using reputation scores in case the latter delivers good performance.
The nodes having higher reputation score will be highly trusted by other nodes in a network. This is because the management of trust is decentralized, which minimizes the chances of attacker nodes in the network.
Conclusion
There are a number of issues in the management of keys in ad hoc networks, particularly due to their characteristics consisting of decentralization, dynamics, and resource limitation. It makes key distribution and verification challenging due to decentralized structure: a network has a highly dynamic structure, and resources must be consumed efficiently. It has been explained that decentralized approaches such as threshold cryptography, self-organizing protocol, light cipher algorithm, and reputation-based trust approach can contribute positively towards the security of ad hoc networks for which secure communication is feasible in various harsh operational environments.

0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home