D 2018

Entropy crowdsourcing - protocols for link key updates in wireless sensor networks

NĚMEC, Lukáš, Radim OŠŤÁDAL, Václav MATYÁŠ and Petr ŠVENDA

Basic information

Original name

Entropy crowdsourcing - protocols for link key updates in wireless sensor networks

Authors

NĚMEC, Lukáš (203 Czech Republic, belonging to the institution), Radim OŠŤÁDAL (203 Czech Republic, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, guarantor, belonging to the institution) and Petr ŠVENDA (203 Czech Republic, belonging to the institution)

Edition

Cham, Switzerland, Security Protocols XXVI: 26th International Workshop, p. 84-92, 9 pp. 2018

Publisher

Springer International Publishing

Other information

Language

English

Type of outcome

Stať ve sborníku

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

Germany

Confidentiality degree

není předmětem státního či obchodního tajemství

Publication form

printed version "print"

References:

Impact factor

Impact factor: 0.402 in 2005

RIV identification code

RIV/00216224:14330/18:00100827

Organization unit

Faculty of Informatics

ISBN

978-3-030-03250-0

ISSN

UT WoS

000672735800009

Keywords in English

entropy extraction; key extraction; link key update; secrecy amplification; wireless sensor networks

Tags

International impact, Reviewed
Změněno: 30/4/2019 09:44, RNDr. Pavel Šmerk, Ph.D.

Abstract

V originále

In this work, we propose a completely different design of key distribution protocols for ad-hoc networks of nodes with restricted resources, wireless sensor networks (WSNs). Earlier research on so-called secrecy amplification (SA) for WSNs went with the discrete “take it or leave it” design – either the newly transferred key components got to their destination securely, or the attacker learned their values. And as the SA measures are probabilistic and preventive in nature, no-one but the attacker knew what the attacker learned (and when Mallory learned a key component, she obviously did not push for the fail-deadly trigger). We propose to combine vanilla secrecy amplification with key extraction from the radio channel, coming up with a novel method to produce and deliver key updates to individual link keys.

Links

GBP202/12/G061, research and development project
Name: Centrum excelence - Institut teoretické informatiky (CE-ITI) (Acronym: CE-ITI)
Investor: Czech Science Foundation