Secure broadcast in distributed networks with strong adversaries

被引:7
|
作者
Szalachowski, Pawel [1 ]
Kim, Tiffany Hyun-Jin [2 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, CH-8092 Zurich, Switzerland
[2] Carnegie Mellon Univ, CyLab, Pittsburgh, PA 15213 USA
关键词
network security; secure group communication; cryptographic protocols; strong adversary; distributed hardware-limited networks;
D O I
10.1002/sec.1296
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a framework that enables secure one-to-many communication for networks with limited capabilities in the face of a strong adversary that can capture an arbitrary set of nodes. Our approach consists of two main components: (a) group key establishment protocol and (b) special key management. Especially, we try to address the following question: How strong of security properties can we achieve for broadcast communication in hardware-limited networks with a strong adversary? We propose approaches and their variants that neither require special hardware nor use costly cryptographic operations. With thorough security and efficiency analyses, we discuss how our solutions can be applied to a variety of hardware-limited distributed systems. We also describe the implementation and evaluation results of the most promising variants. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3739 / 3750
页数:12
相关论文
共 50 条
  • [1] Secure Distributed On-Device Learning Networks with Byzantine Adversaries
    Dong, Yanjie
    Cheng, Julian
    Hossain, Md Jahangir
    Leung, Victor C. M.
    IEEE NETWORK, 2019, 33 (06): : 180 - 187
  • [2] Broadcast from Minicast Secure Against General Adversaries
    Raykov, Pavel
    AUTOMATA, LANGUAGES, AND PROGRAMMING, PT II, 2015, 9135 : 701 - 712
  • [3] Resilient Distributed Diffusion in Networks With Adversaries
    Li, Jiani
    Abbas, Waseem
    Koutsoukos, Xenofon
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2020, 6 : 1 - 17
  • [4] Optimal Exchange of Data over Broadcast Networks with Adversaries
    Heidarzadeh, Anoosheh
    Sprintson, Alex
    2016 INFORMATION THEORY AND APPLICATIONS WORKSHOP (ITA), 2016,
  • [5] Zero knowledge proof for secure two-party computation with malicious adversaries in distributed networks
    Yang, Xiaoyi
    Huang, Meijuan
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (04) : 441 - 450
  • [6] Secure Broadcast in Wireless Sensor Networks
    Yu, Qian
    Zhang, Chang N.
    2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 424 - 429
  • [7] Secure broadcast protocol for wireless sensor networks
    School of Mechanical and Precision Instrument Engineering, Xi’an University of Technology, Weiguo Road, Chang’an District, Xi’an, China
    不详
    不详
    不详
    NSW, Australia
    ICIC Express Lett Part B Appl., 1 (61-66):
  • [8] Confidential and secure broadcast in wireless sensor networks
    Shaheen, Jaleel
    Ostry, Diethelm
    Sivaraman, Vijay
    Jha, Sanjay
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 2164 - 2168
  • [9] Distributed Broadcast in Unknown Radio Networks
    De Marco, Gianluca
    PROCEEDINGS OF THE NINETEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2008, : 208 - 217
  • [10] DISTRIBUTED BROADCAST IN UNKNOWN RADIO NETWORKS
    De Marco, Gianluca
    SIAM JOURNAL ON COMPUTING, 2010, 39 (06) : 2162 - 2175