ABSTRACT

This chapter presents synchronously-non-interactive key agreement and progression (NIKAP) and asynchronously -NIKAP, the non-interactive key agreement and progression protocols tailored for wireless mesh networks. It also presents the results of our recent use of NIKAP to secure the routing process in wireless ad hoc networks. In an asymmetric cryptosystem, there are two ways of ensuring the authenticity of a public key: explicit verification and implicit verification. A-NIKAP has the same non-interactive rekeying capability as S-NIKAP does, but requires no time synchronization service from the underlying network. The non-interactive progression capability of NIKAP makes it attractive to wireless applications in which shared keys need to be established without negotiation through insecure channels, or need to be updated frequently. The attacks to an ad hoc network can be classified into external attacks and internal attacks based on the information acquired by the attackers.