Proceedings of the Third ACM Conference on Wireless Network Security 2010
DOI: 10.1145/1741866.1741889
|View full text |Cite
|
Sign up to set email alerts
|

Secret keys from entangled sensor motes

Abstract: Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and compromise necessitate the use of an on-line key generation, where secret keys are generated by the nodes themselves. However, the cost of such schemes is high since their secrecy is based on computational complexity. Recently, several research contributions justified that the wireless channel itself can be used to generate information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
41
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 41 publications
(47 citation statements)
references
References 13 publications
2
41
0
Order By: Relevance
“…Group key extraction is considered in [13], and the key extraction in [14] is for securing implantable medical devices. Other key extraction approaches [8], [15] are also proposed specifically for the mote platform. There has also been much work on protecting WLANs and sensor networks [16]- [19].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Group key extraction is considered in [13], and the key extraction in [14] is for securing implantable medical devices. Other key extraction approaches [8], [15] are also proposed specifically for the mote platform. There has also been much work on protecting WLANs and sensor networks [16]- [19].…”
Section: Related Workmentioning
confidence: 99%
“…Due to the nature of wireless fading, Eve cannot get any information about the dynamics experienced by Alice and Bob, which has been verified [5], [8], [15]. In addition, the information exposed by information reconciliation has been removed by privacy amplification.…”
Section: Proof Of Securitymentioning
confidence: 99%
“…Wireless sensor devices have been specifically considered in [11] and [4]. In the first, the authors implement and test a ranking method on TelosB wireless motes which are randomly moved, to extract keys at very high rate.…”
Section: Prior Workmentioning
confidence: 99%
“…In the first, the authors implement and test a ranking method on TelosB wireless motes which are randomly moved, to extract keys at very high rate. In [4], the authors vary channel frequency to vary channel response for MICAz motes and satisfactorily extract keys with high rate of key agreement. They specifically consider stationary deployments.…”
Section: Prior Workmentioning
confidence: 99%
“…However, previous works on RSS based secret key generation mainly focused on improving the secret bit generation rate between a pair of wireless devices (by exploiting temporal and spatial variations of radio channel [7], [8], multiple antenna diversity [9], and multiple frequencies [10]). The problem of using RSS to perform key generation among multiple wireless devices to ensure secure group communication remains as a challenge.…”
Section: Introductionmentioning
confidence: 99%