MOBILE SECRET KEY DISTRIBUTION WITH NETWORK CODING

Paulo F. Oliveira, Rui A. Costa, João Barros

Abstract

We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main contribution is a practical scheme that relies on network coding to provide a robust and low-complexity solution for sharing secret keys among sensor nodes. In spite of its role as a key enabler for this approach, the mobile node only has access to encrypted version of the keys. In contrast with probabilistic key pre-distribution schemes our method assures secure connectivity with probability one, requiring only a modest amount of memory — initially each sensor node stores only one key per secured link.

References

  1. Deb, S., Effros, M., Ho, T., Karger, D., Koetter, R., Lun, D., Medard, M., and Ratnakar, N. (2005). Network coding for wireless applications: A brief tutorial. Proc. of IWWAN, London, UK, May.
  2. Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., and Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur., 8(2):228-258.
  3. Eschenauer, L. and Gligor, V. D. (2002). A keymanagement scheme for distributed sensor networks. In CCS 7802: Proceedings of the 9th ACM conference on Computer and communications security, pages 41- 47, New York, NY, USA. ACM Press.
  4. Fragouli, C., Boudec, J.-Y. L., and Widmer, J. (2006). Network coding: an instant primer. SIGCOMM Comput. Commun. Rev., 36(1):63-68.
  5. Lima, L., Médard, M., and Barros, J. (2007). Random Linear Network Coding: A Free Cipher? In Proc. of the IEEE International Symposium on Information Theory (ISIT).
  6. Malan, D., Welsh, M., and Smith, M. (2004). A publickey infrastructure for key distribution in tinyos based on elliptic curve cryptography. In First IEEE International Conference on Sensor and Ad Hoc Communications and Network, Santa Clara, California.
  7. Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521-534.
  8. Stajano, F. (2002). Security for Ubiquitous Computing. John Wiley and Sons.
  9. Stajano, F. and Anderson, R. J. (1999). The resurrecting duckling: Security issues for ad-hoc wireless networks. In Christianson, B., Crispo, B., Malcolm, J. A., and Roe, M., editors, Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, pages 172-194. Springer.
  10. Zhu, S., Setia, S., and Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In CCS 7803: Proceedings of the 10th ACM conference on Computer and communications security, pages 62-72, New York, NY, USA. ACM Press.
Download


Paper Citation


in Harvard Style

F. Oliveira P., A. Costa R. and Barros J. (2007). MOBILE SECRET KEY DISTRIBUTION WITH NETWORK CODING . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 171-174. DOI: 10.5220/0002126801710174


in Bibtex Style

@conference{secrypt07,
author={Paulo F. Oliveira and Rui A. Costa and João Barros},
title={MOBILE SECRET KEY DISTRIBUTION WITH NETWORK CODING},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={171-174},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002126801710174},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - MOBILE SECRET KEY DISTRIBUTION WITH NETWORK CODING
SN - 978-989-8111-12-8
AU - F. Oliveira P.
AU - A. Costa R.
AU - Barros J.
PY - 2007
SP - 171
EP - 174
DO - 10.5220/0002126801710174