Low-Cost Secret-Sharing in Sensor Networks

Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is a problem that has received a lot of attention...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bertier, M, Mostefaoui, A, Tredan, G
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 9
container_issue
container_start_page 1
container_title
container_volume
creator Bertier, M
Mostefaoui, A
Tredan, G
description Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is a problem that has received a lot of attention in the context of ad hoc networks. However, due to hardware constraints of sensors along with multi-hop communication, most of these solutions turn out to be useless for sensor networks. This paper provides basic building blocks to establish secure communication by exchanging secret keys between neighbor nodes without any use of cryptography methods allowing an gain in efficiency. This paper also proposes a second algorithm that extends the secret key establishment to nodes that are not direct neighbors. Among the interesting features of the proposed algorithms we can note a low overhead and the absence of initial configuration.
doi_str_mv 10.1109/HASE.2010.16
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5634305</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5634305</ieee_id><sourcerecordid>5634305</sourcerecordid><originalsourceid>FETCH-LOGICAL-i1286-82b23cea153593b7b92f057d9bcbfad94a1a94ba09e392628013565bd0f509343</originalsourceid><addsrcrecordid>eNotjUtLxDAUheMLLGN37tx0LWS8uXn1LocyOkLRRXU9JG2qQW2lKQz-e-tjdfjOB-cwdilgLQTQzW7TbNcIP2iOWE62BGtIKyQsj1mGRgG3GuzJrxMKlSIggacsE1oCR9B0zvKUogcJQGCFyNh1PR54Naa5aEI7hZk3r26Kw0sRh6UZ0jgVD2E-jNNbumBnvXtPIf_PFXu-3T5VO14_3t1Xm5pHgaXhJXqUbXDLqSbprSfsQduOfOt715FywpHyDihIQoMlCKmN9h30GkgquWJXf7sxhLD_nOKHm7722iwKtPwGsKlEeg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Low-Cost Secret-Sharing in Sensor Networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bertier, M ; Mostefaoui, A ; Tredan, G</creator><creatorcontrib>Bertier, M ; Mostefaoui, A ; Tredan, G</creatorcontrib><description>Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is a problem that has received a lot of attention in the context of ad hoc networks. However, due to hardware constraints of sensors along with multi-hop communication, most of these solutions turn out to be useless for sensor networks. This paper provides basic building blocks to establish secure communication by exchanging secret keys between neighbor nodes without any use of cryptography methods allowing an gain in efficiency. This paper also proposes a second algorithm that extends the secret key establishment to nodes that are not direct neighbors. Among the interesting features of the proposed algorithms we can note a low overhead and the absence of initial configuration.</description><identifier>ISSN: 1530-2059</identifier><identifier>ISBN: 9781424490912</identifier><identifier>ISBN: 142449091X</identifier><identifier>EISSN: 2640-7507</identifier><identifier>EISBN: 9780769542928</identifier><identifier>EISBN: 0769542921</identifier><identifier>DOI: 10.1109/HASE.2010.16</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; Cryptography ; Distributed Algorithm ; Malicious Behavior ; Privacy ; Relays ; Reliability ; Resiliency ; Sensor Network ; Simulation ; Spread spectrum communication ; Wireless Communication ; Wireless sensor networks</subject><ispartof>2010 IEEE 12th International Symposium on High Assurance Systems Engineering, 2010, p.1-9</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5634305$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5634305$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bertier, M</creatorcontrib><creatorcontrib>Mostefaoui, A</creatorcontrib><creatorcontrib>Tredan, G</creatorcontrib><title>Low-Cost Secret-Sharing in Sensor Networks</title><title>2010 IEEE 12th International Symposium on High Assurance Systems Engineering</title><addtitle>HASE</addtitle><description>Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is a problem that has received a lot of attention in the context of ad hoc networks. However, due to hardware constraints of sensors along with multi-hop communication, most of these solutions turn out to be useless for sensor networks. This paper provides basic building blocks to establish secure communication by exchanging secret keys between neighbor nodes without any use of cryptography methods allowing an gain in efficiency. This paper also proposes a second algorithm that extends the secret key establishment to nodes that are not direct neighbors. Among the interesting features of the proposed algorithms we can note a low overhead and the absence of initial configuration.</description><subject>Ad hoc networks</subject><subject>Cryptography</subject><subject>Distributed Algorithm</subject><subject>Malicious Behavior</subject><subject>Privacy</subject><subject>Relays</subject><subject>Reliability</subject><subject>Resiliency</subject><subject>Sensor Network</subject><subject>Simulation</subject><subject>Spread spectrum communication</subject><subject>Wireless Communication</subject><subject>Wireless sensor networks</subject><issn>1530-2059</issn><issn>2640-7507</issn><isbn>9781424490912</isbn><isbn>142449091X</isbn><isbn>9780769542928</isbn><isbn>0769542921</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjUtLxDAUheMLLGN37tx0LWS8uXn1LocyOkLRRXU9JG2qQW2lKQz-e-tjdfjOB-cwdilgLQTQzW7TbNcIP2iOWE62BGtIKyQsj1mGRgG3GuzJrxMKlSIggacsE1oCR9B0zvKUogcJQGCFyNh1PR54Naa5aEI7hZk3r26Kw0sRh6UZ0jgVD2E-jNNbumBnvXtPIf_PFXu-3T5VO14_3t1Xm5pHgaXhJXqUbXDLqSbprSfsQduOfOt715FywpHyDihIQoMlCKmN9h30GkgquWJXf7sxhLD_nOKHm7722iwKtPwGsKlEeg</recordid><startdate>201011</startdate><enddate>201011</enddate><creator>Bertier, M</creator><creator>Mostefaoui, A</creator><creator>Tredan, G</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201011</creationdate><title>Low-Cost Secret-Sharing in Sensor Networks</title><author>Bertier, M ; Mostefaoui, A ; Tredan, G</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i1286-82b23cea153593b7b92f057d9bcbfad94a1a94ba09e392628013565bd0f509343</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Ad hoc networks</topic><topic>Cryptography</topic><topic>Distributed Algorithm</topic><topic>Malicious Behavior</topic><topic>Privacy</topic><topic>Relays</topic><topic>Reliability</topic><topic>Resiliency</topic><topic>Sensor Network</topic><topic>Simulation</topic><topic>Spread spectrum communication</topic><topic>Wireless Communication</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Bertier, M</creatorcontrib><creatorcontrib>Mostefaoui, A</creatorcontrib><creatorcontrib>Tredan, G</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bertier, M</au><au>Mostefaoui, A</au><au>Tredan, G</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Low-Cost Secret-Sharing in Sensor Networks</atitle><btitle>2010 IEEE 12th International Symposium on High Assurance Systems Engineering</btitle><stitle>HASE</stitle><date>2010-11</date><risdate>2010</risdate><spage>1</spage><epage>9</epage><pages>1-9</pages><issn>1530-2059</issn><eissn>2640-7507</eissn><isbn>9781424490912</isbn><isbn>142449091X</isbn><eisbn>9780769542928</eisbn><eisbn>0769542921</eisbn><abstract>Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is a problem that has received a lot of attention in the context of ad hoc networks. However, due to hardware constraints of sensors along with multi-hop communication, most of these solutions turn out to be useless for sensor networks. This paper provides basic building blocks to establish secure communication by exchanging secret keys between neighbor nodes without any use of cryptography methods allowing an gain in efficiency. This paper also proposes a second algorithm that extends the secret key establishment to nodes that are not direct neighbors. Among the interesting features of the proposed algorithms we can note a low overhead and the absence of initial configuration.</abstract><pub>IEEE</pub><doi>10.1109/HASE.2010.16</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1530-2059
ispartof 2010 IEEE 12th International Symposium on High Assurance Systems Engineering, 2010, p.1-9
issn 1530-2059
2640-7507
language eng
recordid cdi_ieee_primary_5634305
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Ad hoc networks
Cryptography
Distributed Algorithm
Malicious Behavior
Privacy
Relays
Reliability
Resiliency
Sensor Network
Simulation
Spread spectrum communication
Wireless Communication
Wireless sensor networks
title Low-Cost Secret-Sharing in Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T09%3A27%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Low-Cost%20Secret-Sharing%20in%20Sensor%20Networks&rft.btitle=2010%20IEEE%2012th%20International%20Symposium%20on%20High%20Assurance%20Systems%20Engineering&rft.au=Bertier,%20M&rft.date=2010-11&rft.spage=1&rft.epage=9&rft.pages=1-9&rft.issn=1530-2059&rft.eissn=2640-7507&rft.isbn=9781424490912&rft.isbn_list=142449091X&rft_id=info:doi/10.1109/HASE.2010.16&rft_dat=%3Cieee_6IE%3E5634305%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769542928&rft.eisbn_list=0769542921&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5634305&rfr_iscdi=true