Key infection: Smart trust for smart dust

被引:78
作者
Anderson, R [1 ]
Chan, HW [1 ]
Perrig, A [1 ]
机构
[1] Univ Cambridge, Cambridge CB2 1TN, England
来源
12TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS | 2004年
关键词
D O I
10.1109/ICNP.2004.1348111
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Future distributed systems may include large self-organizing networks of locally communicating sensor nodes, any small number of which may be subverted by an adversary. Providing security for these sensor networks is important, but the problem is complicated by the fact that managing cryptographic key material is hard: low-cost nodes are neither tamper-proof nor capable of performing public key cryptography efficiently. In this paper we show how the key distribution problem can be dealt with in environments with a partially present, passive adversary: a node wishing to communicate securely with other nodes simply generates a symmetric key and sends it in the clear to its neighbours. Despite the apparent insecurity of this primitive, we can use mechanisms for key updating, multipath secrecy amplification and multihop key propagation to build up extremely resilient trust networks where at most a fixed proportion of communications links can be eavesdropped. We discuss applications in which this assumption is sensible. Many systems must perforce cope with principals who are authenticated weakly, if at all; the resulting issues have often been left in the 'too hard' tray. One particular interest of sensor networks is that they present a sufficiently compact and tractable version of this problem. We can perform quantitative analyses and simulations of alternative strategies, some of which we present here. We also hope that this paper may start to challenge the common belief that authentication is substantially about bootstrapping trust. We argue that, in distributed systems where the opponent can subvert any small proportion of nodes, it is more economic to invest in resilience than in bootstrapping.
引用
收藏
页码:206 / 215
页数:10
相关论文
共 19 条
  • [1] [Anonymous], ANN INT CRYPT C
  • [2] [Anonymous], 1987, Economic Behavior in Adversity
  • [3] [Anonymous], P 8 ACM INT C MOB CO
  • [4] Blom R.J, 1982, Advances in Cryptology-CRYPTO'82, DOI 10.1007/978-1-4757-0602-4_22
  • [5] CHAN H, 2003, IEEE S SEC PRIV MAY
  • [6] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [7] Du W, 2003, P 10 ACM C COMP COMM, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]
  • [8] Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
  • [9] KAHN JM, 1999, INT C MOB COMP NETW
  • [10] The Clifford Paterson Lecture, 1995 - Modelling communication networks, present and future
    Kelly, FP
    [J]. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1996, 354 (1707): : 437 - 463