posted on 2009-01-01, 00:00authored byPatrick TaguePatrick Tague, David Slater, Radha Poovendran, Brian Matt
We address the problem of allowing authorized users, who do not preshare a common key,
to effectively exchange key establishment messages over an insecure channel in the presence
of jamming and message insertion attacks. In this work, we jointly consider the security and
efficiency of key exchange protocols, focusing on the interplay between message fragmentation,
jamming resilience, and verification complexity for protocol optimization. Finally,
we present three fragment verification schemes and demonstrate through analysis and simulation
that in comparison with existing approaches, they can significantly decrease the
amount of time required for key establishment without degrading the guaranteed level of
security.