• DocumentCode
    1667324
  • Title

    Key infection: smart trust for smart dust

  • Author

    Anderson, Ross ; Chan, Haowen ; Perrig, Adrian

  • Author_Institution
    Cambridge Univ., UK
  • fYear
    2004
  • Firstpage
    206
  • Lastpage
    215
  • Abstract
    Future distributed systems may include large self-organizing networks of locally communicating sensor nodes, any small number of which may be subvened by an adversary. Providing security for these sensor networks is important, but the problem is complicated by the fact that managing cryptographic key material is hard: low-cost nodes are neither tamper-proof nor capable of performing public key cryptography efficiently. We show how the key distribution problem can be dealt with in environments with a partially present, passive adversary: a node wishing to communicate securely with other nodes simply generates a symmetric key and sends it in the clear to its neighbours. Despite the apparent insecurity of this primitive, we can use mechanisms for key updating, multipath secrecy amplification and multihop key propagation to build up extremely resilient trust networks where at most a fixed proportion of communications links can be eavesdropped. We discuss applications in which this assumption is sensible. Many systems must perforce cope with principals who are authenticated weakly, if at all; the resulting issues have often been left in the ´too hard´ tray. One particular interest of sensor networks is that they present a sufficiently compact and tractable version of this problem. We can perform quantitative analyses and simulations of alternative strategies, some of which we present here. We also hope that This work may start to challenge the common belief that authentication is substantially about bootstrapping trust. We argue that, in distributed systems where the opponent can subvert any small proportion of nodes, it is more economic to invest in resilience than in bootstrapping.
  • Keywords
    message authentication; public key cryptography; telecommunication links; wireless sensor networks; communications link; key distribution problem; key infection; key updating; low-cost node; multihop key propagation; multipath secrecy amplification; public key cryptography; self-organizing network; sensor network; smart trust; Analytical models; Authentication; Environmental economics; Intelligent sensors; Performance analysis; Public key cryptography; Resilience; Self-organizing networks; Sensor systems; Spread spectrum communication;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Network Protocols, 2004. ICNP 2004. Proceedings of the 12th IEEE International Conference on
  • ISSN
    1092-1648
  • Print_ISBN
    0-7695-2161-4
  • Type

    conf

  • DOI
    10.1109/ICNP.2004.1348111
  • Filename
    1348111