A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
We examine the problem of message recognition by reviewing the definitions and the security model in the literature. In particular, we examine the Jane Doe protocol, which was proposed by Lucks et al., more closely and note its inability to recover in case of a certain adversarial disruption. Our paper saves this well-studied protocol from its unrecoverable state when such adversarial disruption occurs. We propose a new message recognition protocol, which is based on the Jane Doe protocol, and incorporate the resynchronization technique within the protocol itself. That is, without having to provide a separate resynchronization procedure, we overcome the recoverability problem of the Jane Doe protocol. Moreover, we enumerate all possible attacks against the new protocol and show that none of the attacks can occur. We further prove the security of the new protocol and its ability to self-recover once the disruption has stopped.
KeywordsCryptographic Protocols Authentication Recognition Self-Recoverability Pervasive Networks Ad Hoc Networks
Unable to display preview. Download preview PDF.
- 1.Anderson, R., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., Needham, R.: A new family of authentication protocols. In: ACMOSR: ACM Operating Systems Review, vol. 32, pp. 9–20 (1998)Google Scholar
- 3.Hammell, J., Weimerskirch, A., Girao, J., Westhoff, D.: Recognition in a low-power environment. In: ICDCSW 2005: Proceedings of the Second International Workshop on Wireless Ad Hoc Networking (WWAN), Washington, DC, USA, 2005, pp. 933–938. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
- 4.Lucks, S., Zenner, E., Weimerskirch, A., Westhoff, D.: Entity recognition for sensor network motes. In: GI Jahrestagung (2), pp. 145–149 (2005)Google Scholar
- 6.Mashatan, A., Stinson, D.R.: A New Message Recognition Protocol For Ad Hoc Pervasive Networks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 378–394. Springer, Heidelberg (2008)Google Scholar
- 8.Mashatan, A., Stinson, D.R.: Recognition in ad hoc pervasive networks. Technical Report 2008-12, Centre for Applied Cryptographic Research (CACR), University of Waterloo, Canada (2008)Google Scholar