MOBILE SECRET KEY DISTRIBUTION WITH NETWORK CODING
Paulo F. Oliveira, Rui A. Costa, João Barros
2007
Abstract
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main contribution is a practical scheme that relies on network coding to provide a robust and low-complexity solution for sharing secret keys among sensor nodes. In spite of its role as a key enabler for this approach, the mobile node only has access to encrypted version of the keys. In contrast with probabilistic key pre-distribution schemes our method assures secure connectivity with probability one, requiring only a modest amount of memory — initially each sensor node stores only one key per secured link.
References
- Deb, S., Effros, M., Ho, T., Karger, D., Koetter, R., Lun, D., Medard, M., and Ratnakar, N. (2005). Network coding for wireless applications: A brief tutorial. Proc. of IWWAN, London, UK, May.
- Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., and Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur., 8(2):228-258.
- Eschenauer, L. and Gligor, V. D. (2002). A keymanagement scheme for distributed sensor networks. In CCS 7802: Proceedings of the 9th ACM conference on Computer and communications security, pages 41- 47, New York, NY, USA. ACM Press.
- Fragouli, C., Boudec, J.-Y. L., and Widmer, J. (2006). Network coding: an instant primer. SIGCOMM Comput. Commun. Rev., 36(1):63-68.
- Lima, L., Médard, M., and Barros, J. (2007). Random Linear Network Coding: A Free Cipher? In Proc. of the IEEE International Symposium on Information Theory (ISIT).
- Malan, D., Welsh, M., and Smith, M. (2004). A publickey infrastructure for key distribution in tinyos based on elliptic curve cryptography. In First IEEE International Conference on Sensor and Ad Hoc Communications and Network, Santa Clara, California.
- Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521-534.
- Stajano, F. (2002). Security for Ubiquitous Computing. John Wiley and Sons.
- Stajano, F. and Anderson, R. J. (1999). The resurrecting duckling: Security issues for ad-hoc wireless networks. In Christianson, B., Crispo, B., Malcolm, J. A., and Roe, M., editors, Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, pages 172-194. Springer.
- Zhu, S., Setia, S., and Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In CCS 7803: Proceedings of the 10th ACM conference on Computer and communications security, pages 62-72, New York, NY, USA. ACM Press.
Paper Citation
in Harvard Style
F. Oliveira P., A. Costa R. and Barros J. (2007). MOBILE SECRET KEY DISTRIBUTION WITH NETWORK CODING . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 171-174. DOI: 10.5220/0002126801710174
in Bibtex Style
@conference{secrypt07,
author={Paulo F. Oliveira and Rui A. Costa and João Barros},
title={MOBILE SECRET KEY DISTRIBUTION WITH NETWORK CODING},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={171-174},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002126801710174},
isbn={978-989-8111-12-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - MOBILE SECRET KEY DISTRIBUTION WITH NETWORK CODING
SN - 978-989-8111-12-8
AU - F. Oliveira P.
AU - A. Costa R.
AU - Barros J.
PY - 2007
SP - 171
EP - 174
DO - 10.5220/0002126801710174