Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange
<span style="font-variant: small-caps;">vanet</span>s, <span style="font-variant: small-caps;">iot</span>, and many other acronyms represent exciting new technologies that build upon pervasive computation and communications to achieve their goal. As an und...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-10-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/8/10/1172 |
id |
doaj-6c41a5ac10a44144bb4a0fc0802ab31b |
---|---|
record_format |
Article |
spelling |
doaj-6c41a5ac10a44144bb4a0fc0802ab31b2020-11-25T01:32:43ZengMDPI AGElectronics2079-92922019-10-01810117210.3390/electronics8101172electronics8101172Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key ExchangeAriel Stulman0Alan Stulman1Department of Computer Science, Jerusalem College of Technology, Jerusalem 91160, IsraelDepartment of Industrial Engineering, Jerusalem College of Technology, Jerusalem 91160, Israel<span style="font-variant: small-caps;">vanet</span>s, <span style="font-variant: small-caps;">iot</span>, and many other acronyms represent exciting new technologies that build upon pervasive computation and communications to achieve their goal. As an underlying communication model, the (mobile) ad hoc network (<span style="font-variant: small-caps;">manet</span>) paradigm is used, which implements a peer-to-peer communication model rather than the more traditional infrastructure model. Of course, privacy, confidentiality, integrity, and security related issues are of utter importance in such contexts as well. In this paper, we wish to present a key exchange technique, which builds upon the inherent characteristic of <span style="font-variant: small-caps;">manet</span>s: their fluctuating topology. By splitting key exchange information into multiple parts and spraying them over space or time, the ever-changing topology of the network almost completely removes an active attacker’s success ratio. Algorithms are then simulated, and the results presented and discussed. We further point to future directions and uses for this research.https://www.mdpi.com/2079-9292/8/10/1172key exchangeconfidentialityad hoc networks (<span style="font-variant: small-caps">manet</span>s)mobile securitysecurity protocols |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ariel Stulman Alan Stulman |
spellingShingle |
Ariel Stulman Alan Stulman Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange Electronics key exchange confidentiality ad hoc networks (<span style="font-variant: small-caps">manet</span>s) mobile security security protocols |
author_facet |
Ariel Stulman Alan Stulman |
author_sort |
Ariel Stulman |
title |
Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange |
title_short |
Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange |
title_full |
Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange |
title_fullStr |
Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange |
title_full_unstemmed |
Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange |
title_sort |
secured by fluctuating topology using the fluctuating topology of manets to secure key exchange |
publisher |
MDPI AG |
series |
Electronics |
issn |
2079-9292 |
publishDate |
2019-10-01 |
description |
<span style="font-variant: small-caps;">vanet</span>s, <span style="font-variant: small-caps;">iot</span>, and many other acronyms represent exciting new technologies that build upon pervasive computation and communications to achieve their goal. As an underlying communication model, the (mobile) ad hoc network (<span style="font-variant: small-caps;">manet</span>) paradigm is used, which implements a peer-to-peer communication model rather than the more traditional infrastructure model. Of course, privacy, confidentiality, integrity, and security related issues are of utter importance in such contexts as well. In this paper, we wish to present a key exchange technique, which builds upon the inherent characteristic of <span style="font-variant: small-caps;">manet</span>s: their fluctuating topology. By splitting key exchange information into multiple parts and spraying them over space or time, the ever-changing topology of the network almost completely removes an active attacker’s success ratio. Algorithms are then simulated, and the results presented and discussed. We further point to future directions and uses for this research. |
topic |
key exchange confidentiality ad hoc networks (<span style="font-variant: small-caps">manet</span>s) mobile security security protocols |
url |
https://www.mdpi.com/2079-9292/8/10/1172 |
work_keys_str_mv |
AT arielstulman securedbyfluctuatingtopologyusingthefluctuatingtopologyofmanetstosecurekeyexchange AT alanstulman securedbyfluctuatingtopologyusingthefluctuatingtopologyofmanetstosecurekeyexchange |
_version_ |
1725080194777088000 |