Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills
  1. Outputs

A cyber-physical approach to secret key generation in smart environments

Academic Article
Publication Date:
2013
abstract:
Encrypted communication in wireless sensor networks oftentimes requires additional randomness and frequent re-keying in order to avoid known-plain text attacks. Conventional approaches for shared secret generation suffer however from various disadvantages, such as necessity of a trusted third party, protocol scalability, and especially, the computational resources needed for performance-demanding public-key protocols. To appropriately respond to the increasing disproportions between a computationally powerful adversary and lightweight wireless devices, a cyber-physical approach has recently attracted much attention. The general idea is to leverage the properties of the physical world and include them in a design of lightweight security protocols. Especially valuable physical property is the erratic and unpredictable nature of multi-path signal propagation which has already shown itself as a rich source of randomness. This work presents a new cyber-physical approach in order to make secure wireless sensor communications and proposes a secret key extraction algorithm that leverages signal strength fluctuations resulting from dynamic physical environments, e.g. environments experiencing human movements. In particular, this work presents a systematic experimental evaluation by using a real-world sensor network, and analyzes the impact of different moving patterns on legitimate devices and an eavesdropper. Finally, this work quantifies the main factors that influence the key establishment algorithm and propose a protocol which allows secret sharing in an effective and efficient way.
Iris type:
01.01 Articolo in rivista
Keywords:
Received signal strength; Shared secret generation; Wsn; C.2 Computer-communication networks
List of contributors:
Oligeri, Gabriele; Chessa, Stefano; Barsocchi, Paolo
Authors of the University:
BARSOCCHI PAOLO
Handle:
https://iris.cnr.it/handle/20.500.14243/288204
Full Text:
https://iris.cnr.it//retrieve/handle/20.500.14243/288204/85362/prod_314925-doc_200998.pdf
Published in:
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
Journal
  • Overview

Overview

URL

https://link.springer.com/article/10.1007/s12652-011-0051-5
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)