contributor | IPVS, Verteilte Systeme | ||||||||||||||
Kontakt: creator |
Wacker, Arno Rüdiger
| date |
2008-02
| description |
171 pages
|
Key Distribution Schemes for Resource-Constrained Devices in
Wireless Sensor Networks Wireless sensor networks based on highly
resource-constrained devices require symmetric cryptography in order
to make them secure. Integral to this is the exchange of unique
symmetric keys between two devices. In this dissertation, we propose
three novel decentralized key distribution schemes that guarantee
the confidentiality of a key exchange even if an attacker has
compromised some of the devices in the network.
Our first key distribution scheme - the basic key distribution
scheme - guarantees the confidentiality of any new established key
in case there are only eavesdropping attacker and no device failures
present. Our second scheme - the fault-tolerant key distribution
scheme - extends the basic scheme so that also more powerful
attackers and device failures can be handled. Our third proposed key
distribution scheme - the extended key distribution scheme - is also
based on the basic scheme but further optimized in terms of memory
consumption and network traffic.
A central objective of all key distribution scheme designs was to
minimize resource consumption on the individual devices. We evaluate
the resource requirements of our schemes in terms of attacker
resilience, memory requirements, and network traffic both through
theoretical analysis and through simulations.
| format |
application/pdf
| 1436194 Bytes | |
identifier | http://www.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=DIS-2008-01&engl=1 |
language | eng |
publisher | Stuttgart, Germany, Universität Stuttgart |
source | ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart_fi/DIS-2008-01/DIS-2008-01.pdf |
subject | Operating Systems Communications Management (CR D.4.4) |
Software Engineering Interoperability (CR D.2.12) | |
Distributed Systems (CR C.2.4) | |
Network Architecture and Design (CR C.2.1) | |
Schlüsselaustausch | |
Drahtlose Sensornetze | |
Sicherheit | |
Ressourcenbeschränkung | |
Kryptographie | |
pervasive computing | |
key exchange | |
wireless sensor networks | |
ressource-constrained | |
key distribution | |
cryptography | |
title | Key Distribution Schemes for Resource-Constrained Devices in Wireless Sensor Networks |
type | Text |
Doctoral Thesis |