Detailed Information on Publication Record
2018
Entropy crowdsourcing - protocols for link key updates in wireless sensor networks
NĚMEC, Lukáš, Radim OŠŤÁDAL, Václav MATYÁŠ and Petr ŠVENDABasic information
Original name
Entropy crowdsourcing - protocols for link key updates in wireless sensor networks
Authors
NĚMEC, Lukáš (203 Czech Republic, belonging to the institution), Radim OŠŤÁDAL (203 Czech Republic, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, guarantor, belonging to the institution) and Petr ŠVENDA (203 Czech Republic, belonging to the institution)
Edition
Cham, Switzerland, Security Protocols XXVI: 26th International Workshop, p. 84-92, 9 pp. 2018
Publisher
Springer International Publishing
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
Germany
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
printed version "print"
References:
Impact factor
Impact factor: 0.402 in 2005
RIV identification code
RIV/00216224:14330/18:00100827
Organization unit
Faculty of Informatics
ISBN
978-3-030-03250-0
ISSN
UT WoS
000672735800009
Keywords in English
entropy extraction; key extraction; link key update; secrecy amplification; wireless sensor networks
Tags
International impact, Reviewed
Změněno: 30/4/2019 09:44, RNDr. Pavel Šmerk, Ph.D.
Abstract
V originále
In this work, we propose a completely different design of key distribution protocols for ad-hoc networks of nodes with restricted resources, wireless sensor networks (WSNs). Earlier research on so-called secrecy amplification (SA) for WSNs went with the discrete “take it or leave it” design – either the newly transferred key components got to their destination securely, or the attacker learned their values. And as the SA measures are probabilistic and preventive in nature, no-one but the attacker knew what the attacker learned (and when Mallory learned a key component, she obviously did not push for the fail-deadly trigger). We propose to combine vanilla secrecy amplification with key extraction from the radio channel, coming up with a novel method to produce and deliver key updates to individual link keys.
Links
GBP202/12/G061, research and development project |
|