Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification
Status PubMed-not-MEDLINE Jazyk angličtina Země Švýcarsko Médium electronic
Typ dokumentu časopisecké články
PubMed
31752341
PubMed Central
PMC6891686
DOI
10.3390/s19225041
PII: s19225041
Knihovny.cz E-zdroje
- Klíčová slova
- ad hoc networks, crowdsourcing, cryptographic protocol, secrecy amplification (SA), wireless sensor network (WSN),
- Publikační typ
- časopisecké články MeSH
Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, SA protocols can re-secure over 90% of the link keys through an intriguingly simple crowdsourcing mechanism. These protocols allow us to re-take control without any broadly coordinated cooperation, without knowledge of the compromised links, with only very limited knowledge of each particular network node and independently of decisions made by other nodes. Our article first outlines the principles of and presents existing approaches to SA, introducing most of the important related concepts, then presents novel conclusive results for a realistic attacker model parametrised by attacker behaviour and capabilities. We undertook this work using two very different simulators, and we present here the results of analyses and detailed comparisons that have not previously been available. Finally, we report the first real, non-simulated network test results for the most attractive SA protocol, our implementations of which are available as open-source code for two platforms: Arduino and TinyOS. This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices.
Zobrazit více v PubMed
Eschenauer L., Gligor V.D. A key-management scheme for distributed sensor networks; Proceedings of the 9th ACM Conference on Computer and Communications Security; Washington, DC, USA. 18–22 November 2002; pp. 41–47.
Anderson R., Chan H., Perrig A. Key infection: Smart trust for smart dust; Proceedings of the 12th IEEE International Conference on Network Protocols; Berlin, Germany. 8 October 2004; pp. 206–215.
Svenda P., Sekanina L., Matyas V. Evolutionary design of secrecy amplification protocols for wireless sensor networks; Proceedings of the Second ACM Conference on Wireless Network Security; Zurich, Switzerland. 16–19 March 2009; pp. 225–236.
He S., Shin K.G. Steering crowdsourced signal map construction via Bayesian compressive sensing; Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications; Honolulu, HI, USA. 16–19 April 2018; pp. 1016–1024.
Li T., Chen Y., Zhang R., Zhang Y., Hedgpeth T. Secure crowdsourced indoor positioning systems; Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications; Honolulu, HI, USA. 16–19 April 2018; pp. 1034–1042.
Ostadal R., Svenda P., Matyas V. On Secrecy Amplification Protocols; Proceedings of the 9th International Conference on Information Security Theory and Practice, WISTP 2015; Crete, Greece. 24–25 August 2015; Berlin, Germany: Springer; 2015. pp. 3–19. LNCS 9311.
Nemec L., Matyas V., Ostadal R., Svenda P., Palant P.L. Evaluating Dynamic Approaches to Key (Re-) Establishment in Wireless Sensor Networks. Sensors. 2019;19:914. doi: 10.3390/s19040914. PubMed DOI PMC
Nemec L., Ostadal R., Matyas V., Svenda P. Entropy Crowdsourcing–Protocols for Link Key Updates in Wireless Sensor Networks; Proceedings of the Cambridge International Workshop on Security Protocols; Cambridge, UK. 19–21 March 2018; Berlin, Germany: Springer; 2018. pp. 84–92.
Liu Z., Ma J., Huang Q., Moon S. Storage requirements for key distribution in sensor networks; Proceedings of the 2nd International Conference on Sensor Technologies and Applications; Cap Esterel, France. 25–31 August 2008; pp. 631–638.
Kim Y.H., Kim M.H., Lee D.H., Kim C. A Key Management Scheme for Commodity Sensor Networks; Proceedings of the 4th International Conference on Ad Hoc and Wireless Networks; Cancun, Mexico. 6–8 October 2005; Berlin, Germany: Springer; 2005. pp. 113–126.
Liu Z., Ma J., Pei Q., Pang L., Park Y. Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks. IEEE Trans. Wirel. Commun. 2010;9:2643–2653. doi: 10.1109/TWC.2010.061410.100084. DOI
Cvrcek D., Svenda P. Electronic Notes in Theoretical Computer Science. Volume 157. Elsevier; Amsterdam, The Netherlands: 2006. Smart dust security-key infection revisited; pp. 11–25.
Brameier M., Banzhaf W. Linear Genetic Programming. Springer; Berlin, Germany: 2007.
Smolka T., Svenda P., Sekanina L., Matyas V. Genetic Programming. Springer; Berlin, Germany: 2012. Evolutionary design of message efficient secrecy amplification protocols; pp. 194–205.
Kopke A., Swigulski M., Wessel K., Willkomm D., Haneveld P.T.K., Parker T.E.V., Visser O.W., Lichte H.S., Valentin S. Simulating wireless and mobile networks in OMNeT++ the MiXiM vision; Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops; Marseille, France. 3–7 March 2008; p. 71.
Varga A. Using the OMNeT++ discrete event simulation system in education. IEEE Trans. Educ. 1999;42:11. doi: 10.1109/13.804564. DOI
Jurnecka F., Stehlik M., Matyas V. Security and Trust Management. Springer; Berlin, Germany: 2014. Evaluation of key management schemes in WSN; pp. 198–203.
Ostadal R., Svenda P., Matyas V. Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping–Secrecy Amplification Case; Proceedings of the International Conference on Cryptology and Network Security; Milan, Italy. 14–16 November 2016; Berlin, Germany: Springer; 2016. pp. 552–561.
Stetsko A., Stehlik M., Matyas V. Calibrating and comparing simulators for wireless sensor networks; Proceedings of the 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS); Valencia, Spain. 17–22 October 2011; pp. 733–738.
D’Ausilio A. Arduino: A low-cost multipurpose lab equipment. Behav. Res. Methods. 2012;44:305–313. doi: 10.3758/s13428-011-0163-z. PubMed DOI
Levis P., Madden S., Polastre J., Szewczyk R., Whitehouse K., Woo A., Gay D., Hill J., Welsh M., Brewer E., et al. Ambient Intelligence. Springer; Berlin, Germany: 2005. TinyOS: An operating system for sensor networks; pp. 115–148.