Creating Secrets Out of Packet Erasures

被引:10
作者
Safaka, Iris [1 ]
Czap, Laszlo [1 ]
Argyraki, Katerina [1 ]
Fragouli, Christina [1 ,2 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Univ Calif Los Angeles, Los Angeles, CA 90095 USA
基金
美国国家科学基金会; 欧洲研究理事会;
关键词
Secret key generation; packet erasures; multi-hop key agreement; wireless networks;
D O I
10.1109/TIFS.2016.2520887
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present protocols for creating pairwise secrets between nodes in a wireless network, so that these secrets are secure from an eavesdropper, Eve, with unbounded computational and memory capabilities, but with limited network presence. We first present a basic secret-agreement protocol for single-hop networks, where secrets are constructed using traffic exchanged between the nodes, and we show that under standard theoretical assumptions, our protocol is information-theoretically secure. Second, we propose a secret-agreement protocol for arbitrary, multi-hop networks that build on the basic protocol but also comprises design features for leveraging additional sources, that multi-hop offers, for secrecy. Finally, we evaluate our protocols, and we provide experimental evidence that it is feasible to create thousands of secret bits per second, in realistic wireless setups, the security of which is independent of Eve's computational capabilities.
引用
收藏
页码:1177 / 1191
页数:15
相关论文
共 31 条
[1]   On the Inherent Security of Linear Network Coding [J].
Adeli, Majid ;
Liu, Huaping .
IEEE COMMUNICATIONS LETTERS, 2013, 17 (08) :1668-1671
[2]  
[Anonymous], 1978, The Theory of Error-Correcting Codes
[3]  
[Anonymous], NETCOD
[4]  
[Anonymous], 2010, PROC IEEE 29 CONTROL
[5]  
[Anonymous], P IEEE INT C COMM IC
[6]   Robust Key Generation from Signal Envelopes in Wireless Networks [J].
Azimi-Sadjadi, Babak ;
Kiayias, Aggelos ;
Mercado, Alejandra ;
Yener, Bulent .
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, :401-+
[7]   JiST: an efficient approach to simulation using virtual machines [J].
Barr, R ;
Haas, ZJ ;
van Renesse, R .
SOFTWARE-PRACTICE & EXPERIENCE, 2005, 35 (06) :539-576
[8]  
Barr Rimon., 2005, HDB THEORETICAL ALGO, P297
[9]   Secure Network Coding on a Wiretap Network [J].
Cai, Ning ;
Yeung, Raymond W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (01) :424-435
[10]   Secrecy capacities for multiterminal channel models [J].
Csiszar, Imre ;
Narayan, Prakash .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2437-2452