Low-Cost Secret-Sharing in Sensor Networks
Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is a problem that has received a lot of attention...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 9 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Bertier, M Mostefaoui, A Tredan, G |
description | Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is a problem that has received a lot of attention in the context of ad hoc networks. However, due to hardware constraints of sensors along with multi-hop communication, most of these solutions turn out to be useless for sensor networks. This paper provides basic building blocks to establish secure communication by exchanging secret keys between neighbor nodes without any use of cryptography methods allowing an gain in efficiency. This paper also proposes a second algorithm that extends the secret key establishment to nodes that are not direct neighbors. Among the interesting features of the proposed algorithms we can note a low overhead and the absence of initial configuration. |
doi_str_mv | 10.1109/HASE.2010.16 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5634305</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5634305</ieee_id><sourcerecordid>5634305</sourcerecordid><originalsourceid>FETCH-LOGICAL-i1286-82b23cea153593b7b92f057d9bcbfad94a1a94ba09e392628013565bd0f509343</originalsourceid><addsrcrecordid>eNotjUtLxDAUheMLLGN37tx0LWS8uXn1LocyOkLRRXU9JG2qQW2lKQz-e-tjdfjOB-cwdilgLQTQzW7TbNcIP2iOWE62BGtIKyQsj1mGRgG3GuzJrxMKlSIggacsE1oCR9B0zvKUogcJQGCFyNh1PR54Naa5aEI7hZk3r26Kw0sRh6UZ0jgVD2E-jNNbumBnvXtPIf_PFXu-3T5VO14_3t1Xm5pHgaXhJXqUbXDLqSbprSfsQduOfOt715FywpHyDihIQoMlCKmN9h30GkgquWJXf7sxhLD_nOKHm7722iwKtPwGsKlEeg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Low-Cost Secret-Sharing in Sensor Networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bertier, M ; Mostefaoui, A ; Tredan, G</creator><creatorcontrib>Bertier, M ; Mostefaoui, A ; Tredan, G</creatorcontrib><description>Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is a problem that has received a lot of attention in the context of ad hoc networks. However, due to hardware constraints of sensors along with multi-hop communication, most of these solutions turn out to be useless for sensor networks. This paper provides basic building blocks to establish secure communication by exchanging secret keys between neighbor nodes without any use of cryptography methods allowing an gain in efficiency. This paper also proposes a second algorithm that extends the secret key establishment to nodes that are not direct neighbors. Among the interesting features of the proposed algorithms we can note a low overhead and the absence of initial configuration.</description><identifier>ISSN: 1530-2059</identifier><identifier>ISBN: 9781424490912</identifier><identifier>ISBN: 142449091X</identifier><identifier>EISSN: 2640-7507</identifier><identifier>EISBN: 9780769542928</identifier><identifier>EISBN: 0769542921</identifier><identifier>DOI: 10.1109/HASE.2010.16</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; Cryptography ; Distributed Algorithm ; Malicious Behavior ; Privacy ; Relays ; Reliability ; Resiliency ; Sensor Network ; Simulation ; Spread spectrum communication ; Wireless Communication ; Wireless sensor networks</subject><ispartof>2010 IEEE 12th International Symposium on High Assurance Systems Engineering, 2010, p.1-9</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5634305$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5634305$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bertier, M</creatorcontrib><creatorcontrib>Mostefaoui, A</creatorcontrib><creatorcontrib>Tredan, G</creatorcontrib><title>Low-Cost Secret-Sharing in Sensor Networks</title><title>2010 IEEE 12th International Symposium on High Assurance Systems Engineering</title><addtitle>HASE</addtitle><description>Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is a problem that has received a lot of attention in the context of ad hoc networks. However, due to hardware constraints of sensors along with multi-hop communication, most of these solutions turn out to be useless for sensor networks. This paper provides basic building blocks to establish secure communication by exchanging secret keys between neighbor nodes without any use of cryptography methods allowing an gain in efficiency. This paper also proposes a second algorithm that extends the secret key establishment to nodes that are not direct neighbors. Among the interesting features of the proposed algorithms we can note a low overhead and the absence of initial configuration.</description><subject>Ad hoc networks</subject><subject>Cryptography</subject><subject>Distributed Algorithm</subject><subject>Malicious Behavior</subject><subject>Privacy</subject><subject>Relays</subject><subject>Reliability</subject><subject>Resiliency</subject><subject>Sensor Network</subject><subject>Simulation</subject><subject>Spread spectrum communication</subject><subject>Wireless Communication</subject><subject>Wireless sensor networks</subject><issn>1530-2059</issn><issn>2640-7507</issn><isbn>9781424490912</isbn><isbn>142449091X</isbn><isbn>9780769542928</isbn><isbn>0769542921</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjUtLxDAUheMLLGN37tx0LWS8uXn1LocyOkLRRXU9JG2qQW2lKQz-e-tjdfjOB-cwdilgLQTQzW7TbNcIP2iOWE62BGtIKyQsj1mGRgG3GuzJrxMKlSIggacsE1oCR9B0zvKUogcJQGCFyNh1PR54Naa5aEI7hZk3r26Kw0sRh6UZ0jgVD2E-jNNbumBnvXtPIf_PFXu-3T5VO14_3t1Xm5pHgaXhJXqUbXDLqSbprSfsQduOfOt715FywpHyDihIQoMlCKmN9h30GkgquWJXf7sxhLD_nOKHm7722iwKtPwGsKlEeg</recordid><startdate>201011</startdate><enddate>201011</enddate><creator>Bertier, M</creator><creator>Mostefaoui, A</creator><creator>Tredan, G</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201011</creationdate><title>Low-Cost Secret-Sharing in Sensor Networks</title><author>Bertier, M ; Mostefaoui, A ; Tredan, G</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i1286-82b23cea153593b7b92f057d9bcbfad94a1a94ba09e392628013565bd0f509343</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Ad hoc networks</topic><topic>Cryptography</topic><topic>Distributed Algorithm</topic><topic>Malicious Behavior</topic><topic>Privacy</topic><topic>Relays</topic><topic>Reliability</topic><topic>Resiliency</topic><topic>Sensor Network</topic><topic>Simulation</topic><topic>Spread spectrum communication</topic><topic>Wireless Communication</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Bertier, M</creatorcontrib><creatorcontrib>Mostefaoui, A</creatorcontrib><creatorcontrib>Tredan, G</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bertier, M</au><au>Mostefaoui, A</au><au>Tredan, G</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Low-Cost Secret-Sharing in Sensor Networks</atitle><btitle>2010 IEEE 12th International Symposium on High Assurance Systems Engineering</btitle><stitle>HASE</stitle><date>2010-11</date><risdate>2010</risdate><spage>1</spage><epage>9</epage><pages>1-9</pages><issn>1530-2059</issn><eissn>2640-7507</eissn><isbn>9781424490912</isbn><isbn>142449091X</isbn><eisbn>9780769542928</eisbn><eisbn>0769542921</eisbn><abstract>Radio waves are the medium used by sensors to communicate and exchange data. The unconstrained accessibility to any information carried over this medium is a security issue in many sensor-based applications. Ensuring protected wireless communications is a problem that has received a lot of attention in the context of ad hoc networks. However, due to hardware constraints of sensors along with multi-hop communication, most of these solutions turn out to be useless for sensor networks. This paper provides basic building blocks to establish secure communication by exchanging secret keys between neighbor nodes without any use of cryptography methods allowing an gain in efficiency. This paper also proposes a second algorithm that extends the secret key establishment to nodes that are not direct neighbors. Among the interesting features of the proposed algorithms we can note a low overhead and the absence of initial configuration.</abstract><pub>IEEE</pub><doi>10.1109/HASE.2010.16</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1530-2059 |
ispartof | 2010 IEEE 12th International Symposium on High Assurance Systems Engineering, 2010, p.1-9 |
issn | 1530-2059 2640-7507 |
language | eng |
recordid | cdi_ieee_primary_5634305 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Ad hoc networks Cryptography Distributed Algorithm Malicious Behavior Privacy Relays Reliability Resiliency Sensor Network Simulation Spread spectrum communication Wireless Communication Wireless sensor networks |
title | Low-Cost Secret-Sharing in Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T09%3A27%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Low-Cost%20Secret-Sharing%20in%20Sensor%20Networks&rft.btitle=2010%20IEEE%2012th%20International%20Symposium%20on%20High%20Assurance%20Systems%20Engineering&rft.au=Bertier,%20M&rft.date=2010-11&rft.spage=1&rft.epage=9&rft.pages=1-9&rft.issn=1530-2059&rft.eissn=2640-7507&rft.isbn=9781424490912&rft.isbn_list=142449091X&rft_id=info:doi/10.1109/HASE.2010.16&rft_dat=%3Cieee_6IE%3E5634305%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769542928&rft.eisbn_list=0769542921&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5634305&rfr_iscdi=true |