UGSP: secure key establishment protocol for ad-hoc networks

  • Authors:
  • Neelima Arora;R. K. Shyamasundar

  • Affiliations:
  • Currently at: Intel Technology Pvt Ltd, India;School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai, India

  • Venue:
  • ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we propose a secure key establishment protocol, called UGSP, for wireless ad-hoc networks using tamper proof hardware (TPH) UGSP results in creating a secure communication channel between two nodes without any third party involvement and hence is suitable for ad-hoc networks UGSP is robust to man-in-the-middle attack, passive eavesdropping, active impersonation attacks ensuring source authentication, data confidentiality and data integrity for communication The system is amenable to dynamic addition of new members A comparative evaluation of UGSP with other approaches along with issues of scalability and cost-effectiveness are discussed.