Whisper: Local Secret Maintenance in Sensor Networks

作者: Vinayak Naik , Anish Arora , Sandip Bapat , Mohamed Gouda

DOI:

关键词: Computer scienceComputer securitySecure communicationProtocol (object-oriented programming)Computer networkCryptographySecret sharingDenial-of-service attackBootstrapping (linguistics)Shared secretWireless sensor network

摘要: Abstract : A challenge in resource-constrained sensor networks is to provide secure communication an efficient manner, even the presence of denial-of-service attacks. In this paper, we present a simple protocol for secret maintenance between pair network neighbors. We prove that Dolev-Yao adversaries cannot compromise current shared by neighbors, nor can they cause neighbors unduly waste resources. Moreover, show if somehow disclosed, previous secrets are not compromised future be compromised. Finally, propose several ways bootstrapping initial

参考文章(11)
Diana K. Smetters, Paul Stewart, Dirk Balfanz, H. Chi Wong, Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. network and distributed system security symposium. ,(2002)
J.L. Hill, D.E. Culler, Mica: a wireless platform for deeply embedded networks IEEE Micro. ,vol. 22, pp. 12- 24 ,(2002) , 10.1109/MM.2002.1134340
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, SPINS Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01. pp. 189- 199 ,(2001) , 10.1145/381677.381696
Levente Buttyán, Jean-Pierre Hubaux, Srdan Capkun, The quest for security in mobile ad hoc networks mobile ad hoc networking and computing. pp. 146- 155 ,(2001) , 10.1145/501436.501437
L. Gong, Using one-way functions for authentication acm special interest group on data communication. ,vol. 19, pp. 8- 11 ,(1989) , 10.1145/74681.74682
Lidong Zhou, Fred B. Schneider, Robbert Van Renesse, COCA ACM Transactions on Computer Systems. ,vol. 20, pp. 329- 368 ,(2002) , 10.1145/571637.571638
Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, Kristofer Pister, System architecture directions for networked sensors architectural support for programming languages and operating systems. ,vol. 35, pp. 93- 104 ,(2000) , 10.1145/356989.356998
Taher ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms international cryptology conference. ,vol. 31, pp. 10- 18 ,(1985) , 10.1109/TIT.1985.1057074
M.G. Gouda, Chin-Tser Huang, E.N. Elnozahy, Key trees and the security of interval multicast international conference on distributed computing systems. pp. 467- 468 ,(2002) , 10.1109/ICDCS.2002.1022293