Cargando…

Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification

Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Crowdsourcing is at the very heart of these SA...

Descripción completa

Detalles Bibliográficos
Autores principales: Ostadal, Radim, Matyas, Vashek, Svenda, Petr, Nemec, Lukas
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6891686/
https://www.ncbi.nlm.nih.gov/pubmed/31752341
http://dx.doi.org/10.3390/s19225041
_version_ 1783475874839920640
author Ostadal, Radim
Matyas, Vashek
Svenda, Petr
Nemec, Lukas
author_facet Ostadal, Radim
Matyas, Vashek
Svenda, Petr
Nemec, Lukas
author_sort Ostadal, Radim
collection PubMed
description Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, SA protocols can re-secure over 90% of the link keys through an intriguingly simple crowdsourcing mechanism. These protocols allow us to re-take control without any broadly coordinated cooperation, without knowledge of the compromised links, with only very limited knowledge of each particular network node and independently of decisions made by other nodes. Our article first outlines the principles of and presents existing approaches to SA, introducing most of the important related concepts, then presents novel conclusive results for a realistic attacker model parametrised by attacker behaviour and capabilities. We undertook this work using two very different simulators, and we present here the results of analyses and detailed comparisons that have not previously been available. Finally, we report the first real, non-simulated network test results for the most attractive SA protocol, our implementations of which are available as open-source code for two platforms: Arduino and TinyOS. This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices.
format Online
Article
Text
id pubmed-6891686
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-68916862019-12-12 Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification Ostadal, Radim Matyas, Vashek Svenda, Petr Nemec, Lukas Sensors (Basel) Article Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, SA protocols can re-secure over 90% of the link keys through an intriguingly simple crowdsourcing mechanism. These protocols allow us to re-take control without any broadly coordinated cooperation, without knowledge of the compromised links, with only very limited knowledge of each particular network node and independently of decisions made by other nodes. Our article first outlines the principles of and presents existing approaches to SA, introducing most of the important related concepts, then presents novel conclusive results for a realistic attacker model parametrised by attacker behaviour and capabilities. We undertook this work using two very different simulators, and we present here the results of analyses and detailed comparisons that have not previously been available. Finally, we report the first real, non-simulated network test results for the most attractive SA protocol, our implementations of which are available as open-source code for two platforms: Arduino and TinyOS. This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices. MDPI 2019-11-19 /pmc/articles/PMC6891686/ /pubmed/31752341 http://dx.doi.org/10.3390/s19225041 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ostadal, Radim
Matyas, Vashek
Svenda, Petr
Nemec, Lukas
Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification
title Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification
title_full Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification
title_fullStr Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification
title_full_unstemmed Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification
title_short Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification
title_sort crowdsourced security reconstitution for wireless sensor networks: secrecy amplification
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6891686/
https://www.ncbi.nlm.nih.gov/pubmed/31752341
http://dx.doi.org/10.3390/s19225041
work_keys_str_mv AT ostadalradim crowdsourcedsecurityreconstitutionforwirelesssensornetworkssecrecyamplification
AT matyasvashek crowdsourcedsecurityreconstitutionforwirelesssensornetworkssecrecyamplification
AT svendapetr crowdsourcedsecurityreconstitutionforwirelesssensornetworkssecrecyamplification
AT nemeclukas crowdsourcedsecurityreconstitutionforwirelesssensornetworkssecrecyamplification