Mobility

SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors

Free registration required

Executive Summary

Initial deployment of secrets plays a crucial role in any security design, but especially in hardware constrained wireless sensor networks. Many key management schemes assume either manually pre-installed shared secrets or keys authenticated with the aid of out-of-band channels. While manually installing secret keys affects the practicability of the key deployment, out-of-band channels require additional interfaces of already hardware-limited wireless sensor nodes. In this paper, the authors present a key deployment protocol that uses pair-wise ephemeral keys generated from physical layer information which subsequently enables an authenticated exchange of public keys. Hence, this paper presents an elegant solution to the key deployment problem without requiring more capabilities than already available on common low-cost devices.

  • Format: PDF
  • Size: 170.11 KB