首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification
【2h】

Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification

机译:无线传感器网络的众包安全重构:保密放大

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, SA protocols can re-secure over 90% of the link keys through an intriguingly simple crowdsourcing mechanism. These protocols allow us to re-take control without any broadly coordinated cooperation, without knowledge of the compromised links, with only very limited knowledge of each particular network node and independently of decisions made by other nodes. Our article first outlines the principles of and presents existing approaches to SA, introducing most of the important related concepts, then presents novel conclusive results for a realistic attacker model parametrised by attacker behaviour and capabilities. We undertook this work using two very different simulators, and we present here the results of analyses and detailed comparisons that have not previously been available. Finally, we report the first real, non-simulated network test results for the most attractive SA protocol, our implementations of which are available as open-source code for two platforms: Arduino and TinyOS. This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices.
机译:在过去的二十年中,无线传感器网络安全领域的研究产生了许多有趣的发现。我们专注于通过所谓的保密放大(SA)协议(重新)保护传感器节点之间的链接密钥的主题。众包是这些SA协议的核心。即使对于没有防篡改功能的低级别受约束节点,SA协议也能创造奇迹,它们在受到强大攻击者控制的网络中表现出惊人的性能。我们的工作表明,即使所有网络链路中的50%被破坏,SA协议也可以通过一种非常简单的众包机制重新保护90%以上的链路密钥。这些协议允许我们在没有任何广泛协调的合作的情况下重新获得控制权,而无需了解受损的链路,仅对每个特定的网络节点有非常有限的了解,而与其他节点的决策无关。本文首先概述了SA的原理并提出了现有的方法,介绍了大多数重要的相关概念,然后针对由攻击者的行为和能力参数化的现实攻击者模型提出了新颖的结论性结果。我们使用两个截然不同的模拟器进行了这项工作,并且在这里介绍了以前没有的分析结果和详细的比较结果。最后,我们报告了最有吸引力的SA协议的第一个真实的,未模拟的网络测试结果,我们的实现可作为以下两个平台的开源代码获得:Arduino和TinyOS。这项工作证明了SA的实用性(和引人注目的性能),它是具有许多潜在的受害低级设备的网络(以及其他网络)的成熟技术支持者。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号