Title :
Secret Key Generation within Peer-to-Peer Network Overlays
Author :
Madiseh, Masoud Ghoreishi ; McGuire, Michael L. ; Neville, Stephen W.
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Victoria, Victoria, BC, Canada
Abstract :
Key generation, a well known alternative to key distribution, allows two (or more) parties to concurrently generate the same secret key through their independent measurements of a mutually observable random information source. Within wireless networks the reciprocity of channel characterization measurements can be used to provide this required random source of information. This work enables key generation within peer-to-peer wired network by algorithmically extending the notion of wireless reciprocity into the wired domain. It is shown that for larger-scale Erdos-Renyi style peer-to-peer networks, the developed key generation approach remains secure when up to 75% of the peer-to-peer network´s edge are assumed to be adversary controlled. in comparison to prior works, the proposed approach requires zero knowledge of either the network topology or the link capacities allowing it to be particularly well suited to today´s global-scale peer-to-peer networks.
Keywords :
computer network security; cryptography; overlay networks; peer-to-peer computing; Erdos-Renyi style peer-to-peer network; channel characterization measurement; global-scale peer-to-peer network; key distribution; link capacity; network topology; peer-to-peer network overlay; peer-to-peer wired network; random information source; secret key generation; wireless network; wireless reciprocity; Cryptography; Materials; Network topology; Payloads; Peer to peer computing; Topology;
Conference_Titel :
P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2012 Seventh International Conference on
Conference_Location :
Victoria, BC
Print_ISBN :
978-1-4673-2991-0
DOI :
10.1109/3PGCIC.2012.62