TY - GEN
T1 - Secure intermediary caching in mobile wireless networks using asymmetric cipher sequences based encryption
AU - Kaced, Ahmed Reda
AU - Moissinac, Jean Claude
PY - 2007/1/1
Y1 - 2007/1/1
N2 - The use of proxies is commonplace in today's MANETs, where they are used for a huge variety of network services. However the main problem of using proxies is that the end-to-end nature of the communication is broken. This leads to some severe security problems. One of the main questions that arise is how content caching by intermediaries can be done when end-to-end security is required. In this paper, we will address the research issues of when and how endto-end security, like confidentiality and authenticity can be preserved, in mobile ad hoc network communications, when having one or more cache proxies and router nodes in the data path. We propose a solution for an encryption scheme based on Asymmetric Cipher Sequence which allows to an intermediary nodes to cache data and convert the ciphertext for one person into the ciphertext for another person without revealing the secret decryption keys or the plaintext. Implementation results shows that we can simultaneously achieve high encryption through a wireless links.
AB - The use of proxies is commonplace in today's MANETs, where they are used for a huge variety of network services. However the main problem of using proxies is that the end-to-end nature of the communication is broken. This leads to some severe security problems. One of the main questions that arise is how content caching by intermediaries can be done when end-to-end security is required. In this paper, we will address the research issues of when and how endto-end security, like confidentiality and authenticity can be preserved, in mobile ad hoc network communications, when having one or more cache proxies and router nodes in the data path. We propose a solution for an encryption scheme based on Asymmetric Cipher Sequence which allows to an intermediary nodes to cache data and convert the ciphertext for one person into the ciphertext for another person without revealing the secret decryption keys or the plaintext. Implementation results shows that we can simultaneously achieve high encryption through a wireless links.
U2 - 10.1007/978-3-540-77024-4_66
DO - 10.1007/978-3-540-77024-4_66
M3 - Conference contribution
AN - SCOPUS:38449093497
SN - 9783540770237
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 725
EP - 736
BT - Mobile Ad-hoc and Sensor Networks - Third International Conference, MSN 2007, Proceedings
PB - Springer Verlag
T2 - 3rd International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2007
Y2 - 12 December 2007 through 14 December 2007
ER -