Date of Original Version
Abstract or Description
We address the problem of allowing authorized users, who do not preshare a common key, to effectively exchange key establishment messages over an insecure channel in the presence of jamming and message insertion attacks. In this work, we jointly consider the security and efficiency of key exchange protocols, focusing on the interplay between message fragmentation, jamming resilience, and verification complexity for protocol optimization. Finally, we present three fragment verification schemes and demonstrate through analysis and simulation that in comparison with existing approaches, they can significantly decrease the amount of time required for key establishment without degrading the guaranteed level of security.
Computer and Systems Architecture Commons, Data Storage Systems Commons, Digital Communications and Networking Commons, Electromagnetics and Photonics Commons, Hardware Systems Commons, Other Computer Engineering Commons, Other Electrical and Computer Engineering Commons, VLSI and Circuits, Embedded and Hardware Systems Commons