OŠŤÁDAL, Radim, Václav MATYÁŠ, Petr ŠVENDA a Lukáš NĚMEC. Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification. Sensors. 2019, roč. 19, č. 22, s. 1-19. ISSN 1424-8220. Dostupné z: https://dx.doi.org/10.3390/s19225041.
Další formáty:   BibTeX LaTeX RIS
Základní údaje
Originální název Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification
Autoři OŠŤÁDAL, Radim (203 Česká republika, domácí), Václav MATYÁŠ (203 Česká republika, garant, domácí), Petr ŠVENDA (203 Česká republika, domácí) a Lukáš NĚMEC (203 Česká republika, domácí).
Vydání Sensors, 2019, 1424-8220.
Další údaje
Originální jazyk angličtina
Typ výsledku Článek v odborném periodiku
Obor 10200 1.2 Computer and information sciences
Stát vydavatele Švýcarsko
Utajení není předmětem státního či obchodního tajemství
WWW URL
Impakt faktor Impact factor: 3.275
Kód RIV RIV/00216224:14330/19:00111520
Organizační jednotka Fakulta informatiky
Doi http://dx.doi.org/10.3390/s19225041
UT WoS 000503381500219
Klíčová slova anglicky ad hoc networks; crowdsourcing; cryptographic protocol; secrecy amplification (SA); wireless sensor network (WSN)
Příznaky Mezinárodní význam, Recenzováno
Změnil Změnil: RNDr. Pavel Šmerk, Ph.D., učo 3880. Změněno: 8. 5. 2020 12:41.
Anotace
Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, SA protocols can re-secure over 90% of the link keys through an intriguingly simple crowdsourcing mechanism. These protocols allow us to re-take control without any broadly coordinated cooperation, without knowledge of the compromised links, with only very limited knowledge of each particular network node and independently of decisions made by other nodes. Our article first outlines the principles of and presents existing approaches to SA, introducing most of the important related concepts, then presents novel conclusive results for a realistic attacker model parametrised by attacker behaviour and capabilities. We undertook this work using two very different simulators, and we present here the results of analyses and detailed comparisons that have not previously been available. Finally, we report the first real, non-simulated network test results for the most attractive SA protocol, our implementations of which are available as open-source code for two platforms: Arduino and TinyOS. This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices.
VytisknoutZobrazeno: 20. 9. 2024 19:31