Title :
SUDOKU: Secure and usable deployment of keys on wireless sensors
Author :
Wilhelm, Matthias ; Martinovic, Ivan ; Uzun, Ersin ; Schmitt, Jens B.
Author_Institution :
Distrib. Comput. Syst. Lab., Tech. Univ. Kaiserslautern, Kaiserslautern, Germany
Abstract :
Initial deployment of secrets plays a crucial role in any security design, but especially in hardware constrained wireless sensor networks. Many key management schemes assume either manually pre-installed shared secrets or keys authenticated with the aid of out-of-band channels. While manually installing secret keys affects the practicability of the key deployment, out-of-band channels require additional interfaces of already hardware-limited wireless sensor nodes. In this work, we present a key deployment protocol that uses pair-wise ephemeral keys generated from physical layer information which subsequently enables an authenticated exchange of public keys. Hence, this work presents an elegant solution to the key deployment problem without requiring more capabilities than already available on common low-cost devices. To justify the feasibility of this solution, we implement and experimentally evaluate the proposed key deployment protocol using commodity wireless sensor motes.
Keywords :
authorisation; cryptographic protocols; telecommunication security; wireless sensor networks; SUDOKU; authentication; key deployment protocol; key management; physical layer information; pre-installed shared secrets; secret keys; secure deployment; security design; usable deployment; wireless sensor networks; Base stations; Communication system security; Cryptography; Protocols; Sensors; Wireless communication; Wireless sensor networks;
Conference_Titel :
Secure Network Protocols (NPSec), 2010 6th IEEE Workshop on
Conference_Location :
Kyoto
Print_ISBN :
978-1-4244-8916-9
DOI :
10.1109/NPSEC.2010.5634458