Perfect secrecy in wireless networks

被引:0
|
作者
Bradford, PG [1 ]
Gavrylyako, OV [1 ]
Smith, RK [1 ]
机构
[1] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
关键词
D O I
10.1109/ICPPW.2003.1240396
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a classic paper, among a multitude of other security issues, Claude E Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The present paper extends Shannon's notion of perfect secrecy to ad hoc wireless networks of computers. All of the wireless transmissions are insecure. This paper assumes a secure base-station communicating wirelessly using symmetric encryption with physically insecure autonomous computers. These wireless communications use a common symmetric encryption algorithm. Each of the computers has a unique fixed key. The base station has a copy of each key. This scenario gives way to a generalization of Shannon's perfect secrecy. This generalizes to t-perfect secrecy which is directly based on t-wise independence. This gives another natural application of t-wise independence to cryptography. Finally, transmission noise, message collisions, and other issues are briefly discussed with respect to this generalization of Shannon's perfect secrecy.
引用
收藏
页码:409 / 416
页数:8
相关论文
共 50 条
  • [31] Secrecy Outage Analysis of Cognitive Wireless Sensor Networks
    Vuppala, Satyanarayana
    Liu, Weigang
    Ratnarajah, Tharmalingam
    Abreu, Giuseppe
    [J]. CONFERENCE RECORD OF THE 2014 FORTY-EIGHTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, 2014, : 1502 - 1506
  • [32] Scaling Laws for Secrecy Capacity in Cooperative Wireless Networks
    Mirmohseni, Mahtab
    Papadimitratos, Panagiotis
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1527 - 1535
  • [33] Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic
    Liu, Qiuming
    Yu, Li
    Yang, Peng
    Liu, Zuhao
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [34] Secrecy Analysis of Random Wireless Networks with Multiple Eavesdroppers
    Vuppala, Satyanarayana
    Chatzinotas, Symeon
    Ottersten, Bjorn
    [J]. 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [35] Impact of Heterogeneity and Secrecy on the Capacity of Wireless Sensor Networks
    Liu, Qiuming
    Yu, Li
    Liu, Zuhao
    Zheng, Jun
    [J]. SENSORS, 2015, 15 (12) : 30964 - 30980
  • [36] CONCEPTS OF PERFECT SECRECY AND PERFECT AUTHENTICITY - COMMENTS
    CASTAGNOLI, G
    [J]. ALTA FREQUENZA, 1987, 56 (04): : 227 - 228
  • [37] Maximizing Secrecy Rate and Payoff Through Wireless Virtualization in Heterogeneous Wireless Networks
    Sapavath, Naveen Naik
    Alorini, Dema Saad
    Rawat, Danda B.
    Garu, Moses
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 131 - 135
  • [38] Efficient geocasting with perfect delivery in wireless networks
    Seada, K
    Helmy, A
    [J]. 2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 2551 - 2556
  • [39] An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication
    Sui, AF
    Hui, LCK
    Yiu, SM
    Chow, KP
    Tsang, WW
    Chong, CF
    Pun, KH
    Chan, HW
    [J]. 2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 2088 - 2093
  • [40] Impact of Secrecy on Capacity in Large-Scale Wireless Networks
    Zhang, Jinbei
    Pu, Luoyi
    Wang, Xinbing
    [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 3051 - 3055