D 2014

A New Approach to Secrecy Amplification in Partially Compromised Networks

OŠŤÁDAL, Radim; Petr ŠVENDA and Václav MATYÁŠ

Basic information

Original name

A New Approach to Secrecy Amplification in Partially Compromised Networks

Authors

OŠŤÁDAL, Radim (203 Czech Republic); Petr ŠVENDA (203 Czech Republic, guarantor, belonging to the institution) and Václav MATYÁŠ ORCID (203 Czech Republic, belonging to the institution)

Edition

Heidelberg, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, p. 92-109, 18 pp. 2014

Publisher

Springer

Other information

Language

English

Type of outcome

Proceedings paper

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

Germany

Confidentiality degree

is not subject to a state or trade secret

Publication form

printed version "print"

Impact factor

Impact factor: 0.402 in 2005

RIV identification code

RIV/00216224:14330/14:00073940

Organization unit

Faculty of Informatics

ISBN

978-3-319-12059-1

ISSN

EID Scopus

2-s2.0-84910663953

Keywords in English

Secrecy Amplification; Wireless Sensor Networks; Partially Compromised Networks

Tags

International impact, Reviewed
Changed: 27/4/2015 05:59, RNDr. Pavel Šmerk, Ph.D.

Abstract

In the original language

Usage of various key (pre-)distribution schemes (KDSs) in networks with an active attacker results in a partially compromised network where some fraction of keys used to protect link communication is known to the attacker. The secrecy amplification protocols were proposed to secure again some previously compromised communication links by using non-compromised paths to deliver new secure keys. Design of suitable secrecy amplification protocols remains a challenge in scenarios where a trade-off between necessary resources (e.g., energy necessary for transmission of message) and improvement in the number of secure links must be balanced. We inspect classes of secrecy amplification protocols known as node-oriented and group-oriented protocols proposed for use in wireless sensor networks (WSN). We combine analysis of given protocol participant placement via a simulator and manual post-processing to provide a simpler, practically usable hybrid protocol with less steps and lower communication overhead, yet still better in terms of re-secured links than previously proposed protocols.

Links

GAP202/11/0422, research and development project
Name: Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích (Acronym: P202/11/0422)
Investor: Czech Science Foundation