Loading...

Secure overlay routing using key pre-distribution: A linear distance optimization approach

Gharib, M ; Sharif University of Technology | 2016

344 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/TMC.2015.2486758
  3. Publisher: Institute of Electrical and Electronics Engineers Inc , 2016
  4. Abstract:
  5. Key pre-distribution algorithms have recently emerged as efficient alternatives of key management in today's secure communications landscape. Secure routing techniques using key pre-distribution algorithms require special algorithms capable of finding optimal secure overlay paths. To the best of our knowledge, the literature of key pre-distribution systems is still facing a major void in proposing optimal overlay routing algorithms. In the literature work, traditional routing algorithms are typically used twice to find a NETWORK layer path from the source node to the destination and then to find required cryptographic paths. In this paper, we model the problem of secure routing using weighted directed graphs and propose a Boolean linear programming (LP) problem to find the optimal path. Albeit the fact that the solutions to Boolean LP problems are of much higher complexities, we propose a method for solving our problem in polynomial time. In order to evaluate its performance and security measures,we apply our proposed algorithm to a number of recently proposed symmetric and asymmetric key pre-distribution methods. The results show that our proposed algorithm offers great network performance improvements as well as security enhancements when augmenting baseline techniques
  6. Keywords:
  7. Algorithms ; Directed graphs ; Graph theory ; Linear programming ; Network layers ; Optimization ; Polynomial approximation ; Polynomials ; Problem solving ; Routers ; Key pre-distribution ; Linear optimization ; Overlay routing ; Shortest path ; Underlay routing ; Network security
  8. Source: IEEE Transactions on Mobile Computing ; Volume 15, Issue 9 , 2016 , Pages 2333-2344 ; 15361233 (ISSN)
  9. URL: http://ieeexplore.ieee.org/document/7289466