Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2732209.2732215acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Lightweight Protection of Group Content Distribution

Published: 14 April 2015 Publication History

Abstract

Achieving security properties in distributed, hardware-limited, and unattended networks is a challenging task. This setting is challenging because an adversary can capture and physically compromise unattended nodes. In this setting, this paper presents one-way group communication protocols with strong security properties. In particular, how to send messages to a group of hardware-limited nodes with message secrecy and authenticity? We present several protocols and analyze them in terms of security, efficiency, and deployability. The resulting solutions are generic and can be useful in a variety of distributed systems.

References

[1]
AVR-Crypto-Lib. http://www.das-labor.org/wiki/AVR-Crypto-Lib/en.
[2]
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. In Proceedings of Foundations of Computer Science (FOCS), 1997.
[3]
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. J. Cryptol., September 2008.
[4]
S. Berkovits. How to broadcast a secret. In Theory and Application of Cryptographic Techniques, 1991.
[5]
B. Driessen, A. Poschmann, and C. Paar. Comparison of innovative signature algorithms for wsns. In Proceedings of the first ACM conference on Wireless network security, 2008.
[6]
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of ACM conference on Computer and Communications Security (CCS), 2002.
[7]
N. Gura, A. Patel, W. Arvinderpal, H. Eberle, and S. C. Shantz. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. 2004.
[8]
M. Hutter and P. Schwabe. NaCl on 8-bit AVR microcontrollers. In A. Youssef and A. Nitaj, editors, Progress in Cryptology - AFRICACRYPT, 2013.
[9]
J. Katz and Y. Lindell. Introduction to modern cryptography. CRC Press, 2008.
[10]
Y. Kim, A. Perrig, and G. Tsudik. Communication-efficient group key agreement. In M. Dupuy and P. Paradinas, editors, SEC, 2001.
[11]
C. Kuo, M. Luk, R. Negi, and A. Perrig. Message-In-a-Bottle: User-friendly and secure key deployment for sensor nodes. In Proceedings of the ACM Conference on Embedded Networked Sensor System (SenSys), Nov. 2007.
[12]
A. Liu and P. Ning. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th international conference on Information processing in sensor networks, 2008.
[13]
D. Liu and L. J. Camp. Abstract and overview proof of work can work, 2006.
[14]
S. Mauw, I. V. Vessem, and B. Bos. Forward secure communication in wireless sensor networks. In Proceedings of International Conference on Security in Pervasive Computing (SPC), 2006.
[15]
A. Pathan, H.-W. Lee, and C. S. Hong. Security in wireless sensor networks: issues and challenges. In Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, 2006.
[16]
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. Spins: security protocols for sensor networks. Wirel. Netw., 2002.
[17]
D. H. Phan, D. Pointcheval, and M. Strefler. Security notions for broadcast encryption. In Proceedings of international conference on Applied Cryptography and Network Security (ACNS), 2011.
[18]
P. Rogaway. Authenticated-encryption with associated-data. In Proceedings of the 9th ACM conference on Computer and communications security, 2002.
[19]
P. Szalachowski and T. H.-J. Kim. Secure broadcast in distributed networks with strong adversaries. Security and Communication Networks (under revision), 2015.
[20]
P. Szalachowski and Z. Kotulski. One-time broadcast encryption schemes in distributed sensor networks. International Journal of Distributed Sensor Networks, 2012.
[21]
P. Szalachowski, B. Ksiezopolski, and Z. Kotulski. Cmac, ccm and gcm/gmac: Advanced modes of operation of symmetric block ciphers in wireless sensor networks. Inf. Process. Lett., March 2010.
[22]
Y. Wang, G. Attebury, and B. Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 2006.
[23]
T. Zia and A. Zomaya. Security issues in wireless sensor networks. In Proceedings of the International Conference on Systems and Networks Communication, 2006.

Cited By

View all
  • (2018)MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of ThingsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2018.280529113:8(2031-2046)Online publication date: Aug-2018
  • (2016)A broadcast authentication scheme in IoT environments2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)10.1109/AICCSA.2016.7945807(1-6)Online publication date: Nov-2016
  • (2016)Collusion-resilient broadcast encryption based on dual-evolving one-way function treesSecurity and Communication Networks10.1002/sec.15709:16(3633-3645)Online publication date: 10-Nov-2016
  • Show More Cited By

Index Terms

  1. Lightweight Protection of Group Content Distribution

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IoTPTS '15: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security
    April 2015
    50 pages
    ISBN:9781450334495
    DOI:10.1145/2732209
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 April 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. broadcast authentication
    2. broadcast encryption
    3. internet of things security
    4. secure sensor networks

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ASIA CCS '15
    Sponsor:
    ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security
    April 14 - March 14, 2015
    Singapore, Republic of Singapore

    Acceptance Rates

    IoTPTS '15 Paper Acceptance Rate 5 of 13 submissions, 38%;
    Overall Acceptance Rate 16 of 39 submissions, 41%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 24 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of ThingsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2018.280529113:8(2031-2046)Online publication date: Aug-2018
    • (2016)A broadcast authentication scheme in IoT environments2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)10.1109/AICCSA.2016.7945807(1-6)Online publication date: Nov-2016
    • (2016)Collusion-resilient broadcast encryption based on dual-evolving one-way function treesSecurity and Communication Networks10.1002/sec.15709:16(3633-3645)Online publication date: 10-Nov-2016
    • (2015)Secure broadcast in distributed networks with strong adversariesSecurity and Communication Networks10.1002/sec.12968:18(3739-3750)Online publication date: 1-Dec-2015

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media