Date Added: Jan 2010
Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially) sensitive information is continually being gathered about people, it is critical that those keys be both securely deployed and safeguarded from compromise. In this paper, the authors provide solutions for secure key deployment in sensor networks based on the use of Physical Unclonable Functions (PUFs). In particular, the authors show how the properties of Fuzzy Extractors or Helper Data algorithms can be used to securely deploy secret keys to a low cost wireless node. The protocols are more efficient (Round complexity) and allow for lower costs compared to previously proposed ones.