Perfect secrecy in wireless networks

被引:0
|
作者
Bradford, PG [1 ]
Gavrylyako, OV [1 ]
Smith, RK [1 ]
机构
[1] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
关键词
D O I
10.1109/ICPPW.2003.1240396
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a classic paper, among a multitude of other security issues, Claude E Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The present paper extends Shannon's notion of perfect secrecy to ad hoc wireless networks of computers. All of the wireless transmissions are insecure. This paper assumes a secure base-station communicating wirelessly using symmetric encryption with physically insecure autonomous computers. These wireless communications use a common symmetric encryption algorithm. Each of the computers has a unique fixed key. The base station has a copy of each key. This scenario gives way to a generalization of Shannon's perfect secrecy. This generalizes to t-perfect secrecy which is directly based on t-wise independence. This gives another natural application of t-wise independence to cryptography. Finally, transmission noise, message collisions, and other issues are briefly discussed with respect to this generalization of Shannon's perfect secrecy.
引用
收藏
页码:409 / 416
页数:8
相关论文
共 50 条
  • [1] Providing perfect forward secrecy for location-aware wireless sensor networks
    Chi-Tung Chen
    Shu-Yan Huang
    Iuon-Chang Lin
    [J]. EURASIP Journal on Wireless Communications and Networking, 2012
  • [2] A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks
    Xiong, Ling
    Peng, Daiyuan
    Peng, Tu
    Liang, Hongbin
    Liu, Zhicai
    [J]. SENSORS, 2017, 17 (11)
  • [3] Providing perfect forward secrecy for location-aware wireless sensor networks
    Chen, Chi-Tung
    Huang, Shu-Yan
    Lin, Iuon-Chang
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [4] A Secure Mutual Authentication Scheme with Perfect Forward-Secrecy for Wireless Sensor Networks
    Mansour, Mohamed M.
    Salem, Fatty M.
    Saad, Elsayed M.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2018, 2019, 845 : 446 - 456
  • [5] Control of Wireless Networks with Secrecy
    Koksal, C. Emre
    Ercetin, Ozgur
    Sarikaya, Yunus
    [J]. 2010 CONFERENCE RECORD OF THE FORTY FOURTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS (ASILOMAR), 2010, : 47 - 51
  • [6] Control of Wireless Networks With Secrecy
    Koksal, C. Emre
    Ercetin, Ozgur
    Sarikaya, Yunus
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2013, 21 (01) : 324 - 337
  • [7] On Secrecy Capacity Scaling in Wireless Networks
    Koyluoglu, O. Ozan
    Koksal, C. Emre
    El Gamal, Hesham
    [J]. 2010 INFORMATION THEORY AND APPLICATIONS WORKSHOP (ITA), 2010, : 229 - 232
  • [8] Secrecy Outage for Wireless Sensor Networks
    Jameel, Furqan
    Wyne, Shurjeel
    Krikidis, Ioannis
    [J]. IEEE COMMUNICATIONS LETTERS, 2017, 21 (07) : 1565 - 1568
  • [9] On Secrecy Capacity Scaling in Wireless Networks
    Koyluoglu, O. Ozan
    Koksal, Can Emre
    El Gamal, Hesham
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (05) : 3000 - 3015
  • [10] Robust Secrecy Competition in Wireless Networks
    Tang, Xiao
    Ren, Pinyi
    Xu, Datong
    Xu, Dongyang
    [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,