NĚMEC, Lukáš, Radim OŠŤÁDAL, Václav MATYÁŠ and Petr ŠVENDA. Entropy crowdsourcing - protocols for link key updates in wireless sensor networks. In Security Protocols XXVI: 26th International Workshop. Cham, Switzerland: Springer International Publishing, 2018, p. 84-92. ISBN 978-3-030-03250-0. Available from: https://dx.doi.org/10.1007/978-3-030-03251-7_9.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Entropy crowdsourcing - protocols for link key updates in wireless sensor networks
Authors NĚMEC, Lukáš (203 Czech Republic, belonging to the institution), Radim OŠŤÁDAL (203 Czech Republic, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, guarantor, belonging to the institution) and Petr ŠVENDA (203 Czech Republic, belonging to the institution).
Edition Cham, Switzerland, Security Protocols XXVI: 26th International Workshop, p. 84-92, 9 pp. 2018.
Publisher Springer International Publishing
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Germany
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
WWW URL
Impact factor Impact factor: 0.402 in 2005
RIV identification code RIV/00216224:14330/18:00100827
Organization unit Faculty of Informatics
ISBN 978-3-030-03250-0
ISSN 0302-9743
Doi http://dx.doi.org/10.1007/978-3-030-03251-7_9
UT WoS 000672735800009
Keywords in English entropy extraction; key extraction; link key update; secrecy amplification; wireless sensor networks
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 30/4/2019 09:44.
Abstract
In this work, we propose a completely different design of key distribution protocols for ad-hoc networks of nodes with restricted resources, wireless sensor networks (WSNs). Earlier research on so-called secrecy amplification (SA) for WSNs went with the discrete “take it or leave it” design – either the newly transferred key components got to their destination securely, or the attacker learned their values. And as the SA measures are probabilistic and preventive in nature, no-one but the attacker knew what the attacker learned (and when Mallory learned a key component, she obviously did not push for the fail-deadly trigger). We propose to combine vanilla secrecy amplification with key extraction from the radio channel, coming up with a novel method to produce and deliver key updates to individual link keys.
Links
GBP202/12/G061, research and development projectName: Centrum excelence - Institut teoretické informatiky (CE-ITI) (Acronym: CE-ITI)
Investor: Czech Science Foundation
PrintDisplayed: 27/7/2024 20:23