ABSTRACT
Due to the broadcast nature of the wireless channel, information
transmitted over a wireless network can be accessed by unautho-
rized users, also referred to as eavedroppers. Ensuring that only
the legitimate receiver will be able to decipher the transmitted
information has been traditionally achieved by cryptographic
approaches operating at various layers of the network protocol
stack, e.g., WEP (LAN, 1990), at the link layer, SET (SET, 1997),
at the application layer, IPSec (IPSec, 2000), at the network layer,
TLS/SSL (SSL, 1996), and WTLS (WAP, 2002) at the transport layer.
However, cryptographic protocols, mainly developed for wireline
networks, impose significant challenges to wireless devices, which
typically have limited resources. They require significant storage
overhead (Liu et al., 2006) and computational power, thus impacting
battery life (Potlapally et al., 2006). Further, they rely on secret
keys, and key distribution and management over wireless networks
is difficult and expensive (NIST Report, 2009). It should be noted
that a cryptographic approach does not prevent an unauthorized
user from receiving the transmitted packet; it just makes it
computationally difficult for the unauthorized user to decrypt the
message contained in the packets.