Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange

<span style="font-variant: small-caps;">vanet</span>s, <span style="font-variant: small-caps;">iot</span>, and many other acronyms represent exciting new technologies that build upon pervasive computation and communications to achieve their goal. As an und...

Full description

Bibliographic Details
Main Authors: Ariel Stulman, Alan Stulman
Format: Article
Language:English
Published: MDPI AG 2019-10-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/8/10/1172
_version_ 1798034186386276352
author Ariel Stulman
Alan Stulman
author_facet Ariel Stulman
Alan Stulman
author_sort Ariel Stulman
collection DOAJ
description <span style="font-variant: small-caps;">vanet</span>s, <span style="font-variant: small-caps;">iot</span>, and many other acronyms represent exciting new technologies that build upon pervasive computation and communications to achieve their goal. As an underlying communication model, the (mobile) ad hoc network (<span style="font-variant: small-caps;">manet</span>) paradigm is used, which implements a peer-to-peer communication model rather than the more traditional infrastructure model. Of course, privacy, confidentiality, integrity, and security related issues are of utter importance in such contexts as well. In this paper, we wish to present a key exchange technique, which builds upon the inherent characteristic of <span style="font-variant: small-caps;">manet</span>s: their fluctuating topology. By splitting key exchange information into multiple parts and spraying them over space or time, the ever-changing topology of the network almost completely removes an active attacker&#8217;s success ratio. Algorithms are then simulated, and the results presented and discussed. We further point to future directions and uses for this research.
first_indexed 2024-04-11T20:40:41Z
format Article
id doaj.art-6c41a5ac10a44144bb4a0fc0802ab31b
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-04-11T20:40:41Z
publishDate 2019-10-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-6c41a5ac10a44144bb4a0fc0802ab31b2022-12-22T04:04:13ZengMDPI AGElectronics2079-92922019-10-01810117210.3390/electronics8101172electronics8101172Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key ExchangeAriel Stulman0Alan Stulman1Department of Computer Science, Jerusalem College of Technology, Jerusalem 91160, IsraelDepartment of Industrial Engineering, Jerusalem College of Technology, Jerusalem 91160, Israel<span style="font-variant: small-caps;">vanet</span>s, <span style="font-variant: small-caps;">iot</span>, and many other acronyms represent exciting new technologies that build upon pervasive computation and communications to achieve their goal. As an underlying communication model, the (mobile) ad hoc network (<span style="font-variant: small-caps;">manet</span>) paradigm is used, which implements a peer-to-peer communication model rather than the more traditional infrastructure model. Of course, privacy, confidentiality, integrity, and security related issues are of utter importance in such contexts as well. In this paper, we wish to present a key exchange technique, which builds upon the inherent characteristic of <span style="font-variant: small-caps;">manet</span>s: their fluctuating topology. By splitting key exchange information into multiple parts and spraying them over space or time, the ever-changing topology of the network almost completely removes an active attacker&#8217;s success ratio. Algorithms are then simulated, and the results presented and discussed. We further point to future directions and uses for this research.https://www.mdpi.com/2079-9292/8/10/1172key exchangeconfidentialityad hoc networks (<span style="font-variant: small-caps">manet</span>s)mobile securitysecurity protocols
spellingShingle Ariel Stulman
Alan Stulman
Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange
Electronics
key exchange
confidentiality
ad hoc networks (<span style="font-variant: small-caps">manet</span>s)
mobile security
security protocols
title Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange
title_full Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange
title_fullStr Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange
title_full_unstemmed Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange
title_short Secured by Fluctuating Topology Using the Fluctuating Topology of MANETs to Secure Key Exchange
title_sort secured by fluctuating topology using the fluctuating topology of manets to secure key exchange
topic key exchange
confidentiality
ad hoc networks (<span style="font-variant: small-caps">manet</span>s)
mobile security
security protocols
url https://www.mdpi.com/2079-9292/8/10/1172
work_keys_str_mv AT arielstulman securedbyfluctuatingtopologyusingthefluctuatingtopologyofmanetstosecurekeyexchange
AT alanstulman securedbyfluctuatingtopologyusingthefluctuatingtopologyofmanetstosecurekeyexchange