Network coding protocols for secret key distribution

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in packet oriented wireless networks. We focus on exploiting network coding for secret key distribution in a sensor network with a mobile node. Our main contribution is a set of extensions for a simple XOR based scheme, which is shown to enable pairwise keys, cluster keys, key revocation and mobile node authentication, while providing an extra line of defense with respect to attacks on the mobile node. Performance evaluation in terms of security metrics and resource utilization is provided, as well as a basic implementation of the proposed scheme. We deem this class of network coding protocols to be particularly well suited for highly constrained dynamic systems such as wireless sensor networks. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Oliveira, P. F., & Barros, J. (2007). Network coding protocols for secret key distribution. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4804 LNCS, pp. 1718–1733). Springer Verlag. https://doi.org/10.1007/978-3-540-76843-2_42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free