NĚMEC, Lukáš, Radim OŠŤÁDAL, Václav MATYÁŠ and Petr ŠVENDA. Adaptive Secrecy Amplification with Radio Channel Key Extraction (Adaptive secrecy amplification with radio channel key extraction). Online. In Lisa O’Conner. 2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS). New York, NY, USA: IEEE, 2018, p. 123-130. ISBN 978-1-5386-5470-5. Available from: https://dx.doi.org/10.1109/DCOSS.2018.00028.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Adaptive Secrecy Amplification with Radio Channel Key Extraction
Authors NĚMEC, Lukáš (203 Czech Republic, belonging to the institution), Radim OŠŤÁDAL (203 Czech Republic, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, belonging to the institution) and Petr ŠVENDA (203 Czech Republic, belonging to the institution).
Edition New York, NY, USA, 2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS), p. 123-130, 8 pp. 2018.
Publisher IEEE
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10200 1.2 Computer and information sciences
Country of publisher United States of America
Confidentiality degree is not subject to a state or trade secret
Publication form electronic version available online
WWW URL
RIV identification code RIV/00216224:14330/18:00101123
Organization unit Faculty of Informatics
ISBN 978-1-5386-5470-5
ISSN 2325-2944
Doi http://dx.doi.org/10.1109/DCOSS.2018.00028
UT WoS 000518380200020
Keywords in English Protocols;Cryptography;Fading channels;Wireless sensor networks;Quantization (signal);Dynamic scheduling;adaptive; autonomous; cryptography; distributed; protocol; security; wireless radio communication
Tags firank_B
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 13/5/2020 19:17.
Abstract
Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. Our paper addresses the issue how cryptographic link keys between communicating sensor nodes can be continuously re-secured even in presence of an attacker who can read the memory of captured nodes. Distributed sensor systems enable us to use two different approaches to link key (re-)establishment – secrecy amplification and key extraction from radio channel fading. A secrecy amplification protocol lets a group of neighboring nodes cooperate together to re-secure previously compromised link keys using the non-compromised paths, and previous research showed the ability of secrecy amplification protocols to improve the security of a network from 50% of compromised link keys to 90% of secure keys. Key extraction then exploits radio channel properties to generate secret bits shared between two radio-enabled devices. We propose to combine secrecy amplification and key extraction into a dynamic protocol, where every node will dynamically decide what approach provides a greater benefit, considering the probability of getting the link key re-secured and the resources available. In principle, the more standard traffic messages are exchanged on a given link, the more beneficiary is the usage of key extractions. And less busy links then rely on secrecy amplification.
Links
GBP202/12/G061, research and development projectName: Centrum excelence - Institut teoretické informatiky (CE-ITI) (Acronym: CE-ITI)
Investor: Czech Science Foundation
PrintDisplayed: 26/4/2024 22:36