GossiCrypt : wireless sensor network data confidentiality against parasitic adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adversary, which seeks to exploit sensor networks by obtaining measurements in an unauthorized way. Our low-complexity soluti...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/90874 http://hdl.handle.net/10220/6165 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-90874 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-908742020-05-28T07:17:49Z GossiCrypt : wireless sensor network data confidentiality against parasitic adversaries Luo, Jun. Panagiotis Papadimitratos. Hubaux, Jean-Pierre. School of Computer Engineering IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (5th : 2008 : San Francisco, California, US) DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adversary, which seeks to exploit sensor networks by obtaining measurements in an unauthorized way. Our low-complexity solution, GossiCrypt, leverages on the large scale of sensor networks to protect confidentiality efficiently and effectively. GossiCrypt protects data by symmetric key encryption at their source nodes and re-encryption at a randomly chosen subset of nodes en route to the sink. Furthermore, it employs key refreshing to mitigate the physical compromise of cryptographic keys. We validate GossiCrypt analytically and with simulations, showing it protects data confidentiality with probability almost one. Moreover, compared with a system that uses public-key data encryption, the energy consumption of GossiCrypt is tens to thousands of times lower. Published version 2009-12-17T08:12:53Z 2019-12-06T17:55:39Z 2009-12-17T08:12:53Z 2019-12-06T17:55:39Z 2008 2008 Conference Paper Luo, J., Panagiotis, P., & Hubaux, J. P. (2008). GossiCrypt : wireless sensor network data confidentiality against parasitic adversaries. IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (5th:2008:San Francisco). https://hdl.handle.net/10356/90874 http://hdl.handle.net/10220/6165 10.1109/SAHCN.2008.60 140292 en IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks © 2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. http://www.ieee.org/portal/site. 10 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks Luo, Jun. Panagiotis Papadimitratos. Hubaux, Jean-Pierre. GossiCrypt : wireless sensor network data confidentiality against parasitic adversaries |
description |
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adversary, which seeks to exploit sensor networks by obtaining measurements in an unauthorized way. Our low-complexity solution, GossiCrypt, leverages on the large scale of sensor networks to protect confidentiality efficiently and effectively. GossiCrypt protects data by symmetric key encryption at their source nodes and re-encryption at a randomly chosen subset of nodes en route to the sink. Furthermore, it employs key refreshing to mitigate the physical compromise of cryptographic keys. We validate GossiCrypt analytically and with simulations, showing it protects data confidentiality with probability almost one. Moreover, compared with a system that uses public-key data encryption, the energy consumption of GossiCrypt is tens to thousands of times lower. |
author2 |
School of Computer Engineering |
author_facet |
School of Computer Engineering Luo, Jun. Panagiotis Papadimitratos. Hubaux, Jean-Pierre. |
format |
Conference or Workshop Item |
author |
Luo, Jun. Panagiotis Papadimitratos. Hubaux, Jean-Pierre. |
author_sort |
Luo, Jun. |
title |
GossiCrypt : wireless sensor network data confidentiality against parasitic adversaries |
title_short |
GossiCrypt : wireless sensor network data confidentiality against parasitic adversaries |
title_full |
GossiCrypt : wireless sensor network data confidentiality against parasitic adversaries |
title_fullStr |
GossiCrypt : wireless sensor network data confidentiality against parasitic adversaries |
title_full_unstemmed |
GossiCrypt : wireless sensor network data confidentiality against parasitic adversaries |
title_sort |
gossicrypt : wireless sensor network data confidentiality against parasitic adversaries |
publishDate |
2009 |
url |
https://hdl.handle.net/10356/90874 http://hdl.handle.net/10220/6165 |
_version_ |
1681058324713308160 |