Secure broadcast in distributed networks with strong adversaries

被引:7
|
作者
Szalachowski, Pawel [1 ]
Kim, Tiffany Hyun-Jin [2 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, CH-8092 Zurich, Switzerland
[2] Carnegie Mellon Univ, CyLab, Pittsburgh, PA 15213 USA
关键词
network security; secure group communication; cryptographic protocols; strong adversary; distributed hardware-limited networks;
D O I
10.1002/sec.1296
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a framework that enables secure one-to-many communication for networks with limited capabilities in the face of a strong adversary that can capture an arbitrary set of nodes. Our approach consists of two main components: (a) group key establishment protocol and (b) special key management. Especially, we try to address the following question: How strong of security properties can we achieve for broadcast communication in hardware-limited networks with a strong adversary? We propose approaches and their variants that neither require special hardware nor use costly cryptographic operations. With thorough security and efficiency analyses, we discuss how our solutions can be applied to a variety of hardware-limited distributed systems. We also describe the implementation and evaluation results of the most promising variants. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3739 / 3750
页数:12
相关论文
共 50 条
  • [41] Secure distributed routing in ad hoc networks
    Mir, RN
    Wani, AM
    IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1091 - 1095
  • [42] Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing
    Beghaeiraveri, Seyed Amir Hosseini
    Izadi, Mohammad
    Rezvani, Mohsen
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [43] Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization
    Liang, Yingbin
    Poor, H. Vincent
    Ying, Lei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 682 - 692
  • [44] Secure Broadcast with One-Time Signatures in Controller Area Networks
    Groza, Bogdan
    Murvay, Pal-Stefan
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2013, 5 (03) : 1 - 18
  • [45] Adaptively Secure Broadcast
    Hirt, Martin
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 466 - 485
  • [46] Secure Broadcast Ambients
    Gunter, Elsa L.
    Yasmeen, Ayesha
    FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 257 - 271
  • [47] Asynchronous secure communication tolerating mixed adversaries
    Srinathan, K
    Kumar, MVNA
    Rangan, CP
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 224 - 242
  • [48] Encryption Schemes Secure Against Profiling Adversaries
    Diaz-Santiago, Sandra
    Chakraborty, Debrup
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2012, 2014, 455 : 172 - 191
  • [49] Strong Authentication for Secure Content Access in Converged Networks
    Nallusamy, Rajarathnam
    Paul, Sanjoy
    2009 IEEE 3RD INTERNATIONAL SYMPOSIUM ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (ANTS 2009), 2009, : 91 - 93
  • [50] Evaluation of a distributed broadcast scheduling protocol for multihop radio networks
    Ma, XP
    Lloyd, EL
    2001 MILCOM, VOLS 1 AND 2, PROCEEDINGS: COMMUNICATIONS FOR NETWORK-CENTRIC OPERATIONS: CREATING THE INFORMATION FORCE, 2001, : 998 - 1002