Next Article in Journal
Multifunctional Medical Recovery and Monitoring System for the Human Lower Limbs
Next Article in Special Issue
A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments
Previous Article in Journal
Technology Support for Collaborative Preparation of Emergency Plans
Previous Article in Special Issue
Designing an Image Encryption Scheme Based on Compressive Sensing and Non-Uniform Quantization for Wireless Visual Sensor Networks
Article

Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification

Centre for Research on Cryptography and Security, Faculty of Informatics, Masaryk University, Brno 60200, Czech Republic
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(22), 5041; https://doi.org/10.3390/s19225041
Received: 10 October 2019 / Revised: 13 November 2019 / Accepted: 14 November 2019 / Published: 19 November 2019
Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocols. Crowdsourcing is at the very heart of these SA protocols. Not only do SA protocols work wonders even for low-level constrained nodes with no tamper resistance, they exhibit astonishing performance in networks under significant attacker control. Our work shows that even when 50% of all network links are compromised, SA protocols can re-secure over 90% of the link keys through an intriguingly simple crowdsourcing mechanism. These protocols allow us to re-take control without any broadly coordinated cooperation, without knowledge of the compromised links, with only very limited knowledge of each particular network node and independently of decisions made by other nodes. Our article first outlines the principles of and presents existing approaches to SA, introducing most of the important related concepts, then presents novel conclusive results for a realistic attacker model parametrised by attacker behaviour and capabilities. We undertook this work using two very different simulators, and we present here the results of analyses and detailed comparisons that have not previously been available. Finally, we report the first real, non-simulated network test results for the most attractive SA protocol, our implementations of which are available as open-source code for two platforms: Arduino and TinyOS. This work demonstrates the practical usability (and the attractive performance) of SA, serving as a ripe technology enabler for (among others) networks with many potentially compromised low-level devices. View Full-Text
Keywords: ad hoc networks; crowdsourcing; cryptographic protocol; secrecy amplification (SA); wireless sensor network (WSN) ad hoc networks; crowdsourcing; cryptographic protocol; secrecy amplification (SA); wireless sensor network (WSN)
Show Figures

Figure 1

MDPI and ACS Style

Ostadal, R.; Matyas, V.; Svenda, P.; Nemec, L. Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification. Sensors 2019, 19, 5041. https://doi.org/10.3390/s19225041

AMA Style

Ostadal R, Matyas V, Svenda P, Nemec L. Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification. Sensors. 2019; 19(22):5041. https://doi.org/10.3390/s19225041

Chicago/Turabian Style

Ostadal, Radim, Vashek Matyas, Petr Svenda, and Lukas Nemec. 2019. "Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification" Sensors 19, no. 22: 5041. https://doi.org/10.3390/s19225041

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop