2018
Adaptive Secrecy Amplification with Radio Channel Key Extraction
NĚMEC, Lukáš, Radim OŠŤÁDAL, Václav MATYÁŠ a Petr ŠVENDAZákladní údaje
Originální název
Adaptive Secrecy Amplification with Radio Channel Key Extraction
Autoři
NĚMEC, Lukáš (203 Česká republika, domácí), Radim OŠŤÁDAL (203 Česká republika, domácí), Václav MATYÁŠ (203 Česká republika, domácí) a Petr ŠVENDA (203 Česká republika, domácí)
Vydání
New York, NY, USA, 2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS), od s. 123-130, 8 s. 2018
Nakladatel
IEEE
Další údaje
Jazyk
angličtina
Typ výsledku
Stať ve sborníku
Obor
10200 1.2 Computer and information sciences
Stát vydavatele
Spojené státy
Utajení
není předmětem státního či obchodního tajemství
Forma vydání
elektronická verze "online"
Odkazy
Kód RIV
RIV/00216224:14330/18:00101123
Organizační jednotka
Fakulta informatiky
ISBN
978-1-5386-5470-5
ISSN
UT WoS
000518380200020
Klíčová slova anglicky
Protocols;Cryptography;Fading channels;Wireless sensor networks;Quantization (signal);Dynamic scheduling;adaptive; autonomous; cryptography; distributed; protocol; security; wireless radio communication
Příznaky
Mezinárodní význam, Recenzováno
Změněno: 13. 5. 2020 19:17, RNDr. Pavel Šmerk, Ph.D.
Anotace
V originále
Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. Our paper addresses the issue how cryptographic link keys between communicating sensor nodes can be continuously re-secured even in presence of an attacker who can read the memory of captured nodes. Distributed sensor systems enable us to use two different approaches to link key (re-)establishment – secrecy amplification and key extraction from radio channel fading. A secrecy amplification protocol lets a group of neighboring nodes cooperate together to re-secure previously compromised link keys using the non-compromised paths, and previous research showed the ability of secrecy amplification protocols to improve the security of a network from 50% of compromised link keys to 90% of secure keys. Key extraction then exploits radio channel properties to generate secret bits shared between two radio-enabled devices. We propose to combine secrecy amplification and key extraction into a dynamic protocol, where every node will dynamically decide what approach provides a greater benefit, considering the probability of getting the link key re-secured and the resources available. In principle, the more standard traffic messages are exchanged on a given link, the more beneficiary is the usage of key extractions. And less busy links then rely on secrecy amplification.
Návaznosti
GBP202/12/G061, projekt VaV |
|