Entropy crowdsourcing - protocols for link key updates in wireless sensor networks
Authors | |
---|---|
Year of publication | 2018 |
Type | Article in Proceedings |
Conference | Security Protocols XXVI: 26th International Workshop |
MU Faculty or unit | |
Citation | |
Web | https://link.springer.com/chapter/10.1007/978-3-030-03251-7_9 |
Doi | http://dx.doi.org/10.1007/978-3-030-03251-7_9 |
Keywords | entropy extraction; key extraction; link key update; secrecy amplification; wireless sensor networks |
Description | In this work, we propose a completely different design of key distribution protocols for ad-hoc networks of nodes with restricted resources, wireless sensor networks (WSNs). Earlier research on so-called secrecy amplification (SA) for WSNs went with the discrete “take it or leave it” design – either the newly transferred key components got to their destination securely, or the attacker learned their values. And as the SA measures are probabilistic and preventive in nature, no-one but the attacker knew what the attacker learned (and when Mallory learned a key component, she obviously did not push for the fail-deadly trigger). We propose to combine vanilla secrecy amplification with key extraction from the radio channel, coming up with a novel method to produce and deliver key updates to individual link keys. |
Related projects: |