A cyber-physical approach to secret key generation in smart environments (Articolo in rivista)

Type
Label
  • A cyber-physical approach to secret key generation in smart environments (Articolo in rivista) (literal)
Anno
  • 2013-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1007/s12652-011-0051-5 ? (literal)
Alternative label
  • Barsocchi, P. (1); Chessa, S. (2); Martinovic, I. (3) ; Oligeri, G. (1); (2013)
    A cyber-physical approach to secret key generation in smart environments
    in Journal of Ambient Intelligence and Humanized Computing
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • Barsocchi, P. (1); Chessa, S. (2); Martinovic, I. (3) ; Oligeri, G. (1); (literal)
Pagina inizio
  • 1 (literal)
Pagina fine
  • 16 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#altreInformazioni
  • [Online First 12/05/2011] Tipo Progetto EU_FP7 UNIVERsal open platform and reference Specification for Ambient Assisted Living Acronimo UNIVERSAAL Grant agreement 247950 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://www.springerlink.com/content/6r8p740411743345/ (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroVolume
  • 4 (literal)
Rivista
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#numeroFascicolo
  • 1 (literal)
Note
  • Scopu (literal)
  • PuMa (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • (1) CNR-ISTI, Pisa; (2) Department of Computer Science, Univ. Pisa; (3) Computer Science Department, University of Kaiserslautern, Germany (literal)
Titolo
  • A cyber-physical approach to secret key generation in smart environments (literal)
Abstract
  • Encrypted communication in wireless sensor networks oftentimes requires additional randomness and frequent re-keying in order to avoid known-plain text attacks. Conventional approaches for shared secret generation suffer however from various disadvantages, such as necessity of a trusted third party, protocol scalability, and especially, the computational resources needed for performance-demanding public-key protocols. To appropriately respond to the increasing disproportions between a computationally powerful adversary and lightweight wireless devices, a cyber-physical approach has recently attracted much attention. The general idea is to leverage the properties of the physical world and include them in a design of lightweight security protocols. Especially valuable physical property is the erratic and unpredictable nature of multi-path signal propagation which has already shown itself as a rich source of randomness. This work presents a new cyber-physical approach in order to make secure wireless sensor communications and proposes a secret key extraction algorithm that leverages signal strength fluctuations resulting from dynamic physical environments, e.g. environments experiencing human movements. In particular, this work presents a systematic experimental evaluation by using a real-world sensor network, and analyzes the impact of different moving patterns on legitimate devices and an eavesdropper. Finally, this work quantifies the main factors that influence the key establishment algorithm and propose a protocol which allows secret sharing in an effective and efficient way. (literal)
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#rivistaDi
Insieme di parole chiave di
data.CNR.it