Secure intermediary caching in mobile wireless networks using asymmetric cipher sequences based encryption

Ahmed Reda Kaced, Jean Claude Moissinac

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The use of proxies is commonplace in today's MANETs, where they are used for a huge variety of network services. However the main problem of using proxies is that the end-to-end nature of the communication is broken. This leads to some severe security problems. One of the main questions that arise is how content caching by intermediaries can be done when end-to-end security is required. In this paper, we will address the research issues of when and how endto-end security, like confidentiality and authenticity can be preserved, in mobile ad hoc network communications, when having one or more cache proxies and router nodes in the data path. We propose a solution for an encryption scheme based on Asymmetric Cipher Sequence which allows to an intermediary nodes to cache data and convert the ciphertext for one person into the ciphertext for another person without revealing the secret decryption keys or the plaintext. Implementation results shows that we can simultaneously achieve high encryption through a wireless links.

Original languageEnglish
Title of host publicationMobile Ad-hoc and Sensor Networks - Third International Conference, MSN 2007, Proceedings
PublisherSpringer Verlag
Pages725-736
Number of pages12
ISBN (Print)9783540770237
DOIs
Publication statusPublished - 1 Jan 2007
Externally publishedYes
Event3rd International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2007 - Beijing, China
Duration: 12 Dec 200714 Dec 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4864 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2007
Country/TerritoryChina
CityBeijing
Period12/12/0714/12/07

Fingerprint

Dive into the research topics of 'Secure intermediary caching in mobile wireless networks using asymmetric cipher sequences based encryption'. Together they form a unique fingerprint.

Cite this