DocumentCode
831721
Title
A Network Coding Approach to Secret Key Distribution
Author
Oliveira, Paulo F. ; Barros, Joao
Author_Institution
Fac. de Cienc., Dept. de Cienc. de Comput., Univ. do Porto, Porto
Volume
3
Issue
3
fYear
2008
Firstpage
414
Lastpage
423
Abstract
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main contribution is a set of secure protocols that rely on simple network coding operations to provide a robust and low-complexity solution for sharing secret keys among sensor nodes, including pairwise keys, cluster keys, key revocation, and mobile node authentication. Despite its role as a key enabler for this approach, the mobile node only has access to an encrypted version of the keys, providing information-theoretic security with respect to attacks focused on the mobile node. Our results include performance evaluation in terms of security metrics and a detailed analysis of resource utilization. The basic scheme was implemented and tested in a real-life sensor network testbed. We deem this class of network coding protocols to be particularly well suited for highly constrained dynamic systems such as wireless sensor networks.
Keywords
encoding; mobile radio; telecommunication security; wireless sensor networks; key revocation; mobile device; mobile node authentication; multiple scattered sensor nodes; network coding protocols; secret key distribution; secure protocols; security metrics; wireless sensor networks; Access protocols; Authentication; Cryptography; Information security; Network coding; Performance analysis; Resource management; Robustness; Scattering; Testing; Network coding; secret key distribution; sensor networks;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2008.928538
Filename
4598828
Link To Document