Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,099 Hits in 6.2 sec

Secure Key Exchange in Wireless Networks

Laszlo Czap, Christina Fragouli
2011 2011 International Symposium on Networking Coding  
Similarly to [1], the scheme presented here makes use of erasures over the wireless channel.  ...  We investigate the problem of exchanging a secret key within a group of wireless devices.  ...  An appropriate number of linear combinations of the local keys are created to establish the secret group key.  ... 
doi:10.1109/isnetcod.2011.5978921 fatcat:qa5no4eodjfv5hb6qfzmkk7bfm

A concatenated coding scheme for biometric template protection

Xiaoying Shao, Haiyun Xu, Raymond N.J. Veldhuis, Cornelis H. Slump
2012 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
The erasure decoder can reconstruct the secret key by collecting enough surviving packets.  ...  The key idea is to transmit more packets than needed for decoding and allow the erasure-encoded packet suffering high BER to be discarded.  ...  To figure out the secret key, the attacker needs to guess 2 N times, where N is the number of packets required in the erasure decoder.  ... 
doi:10.1109/icassp.2012.6288266 dblp:conf/icassp/ShaoXVS12 fatcat:eguetdit5rfkllydssjywlg54u

Exchanging Secrets without Using Cryptography [article]

Iris Safaka, Mahdi J. Siavoshani, Uday Pulleti, Emre Atsan, Christina Fragouli, Katerina Argyraki, Suhas Diggavi
2012 arXiv   pre-print
We assume that the nodes initially share a (small) piece of information, but do not have access to any out-of-band channel.  ...  can achieve a secret-generation rate of 38 Kbps.  ...  Efficiency of secret agreement as a function of the erasure probability of the channels (assuming identical erasure channels) for our protocol (solid lines) and the alternative protocol (dashed lines).  ... 
arXiv:1105.4991v2 fatcat:yigvxrld3ffmtcxy2lcxzttwwm

Exchanging pairwise secrets efficiently

Iris Safaka, Christina Fragouli, Katerina Argyraki, Suhas Diggavi
2013 2013 Proceedings IEEE INFOCOM  
We consider the problem where a group of wireless nodes, connected to the same broadcast domain, want to create pairwise secrets, in the presence of an adversary Eve, who tries to listen in and steal these  ...  Using a small wireless testbed of smartphones, we provide experimental evidence that it is feasible for 5 nodes to create thousands of secret bits per second, with their secrecy being independent from  ...  In the particular example, these packets turn out not to be useful in creating the Alice/Bob secret, because Calvin knows both of them (and we want the secret to be unknown to Calvin).  ... 
doi:10.1109/infcom.2013.6567030 dblp:conf/infocom/SafakaFAD13 fatcat:dbwypcqqvbe3dfb7lh4eiv4i2e

Creating secrets out of erasures

Katerina Argyraki, Suhas Diggavi, Melissa Duarte, Christina Fragouli, Marios Gatzianas, Panagiotis Kostopoulos
2013 Proceedings of the 19th annual international conference on Mobile computing & networking - MobiCom '13  
Our system consists of two steps: (1) The nodes transmit packets following a special pattern, such that Eve learns very little about a given fraction of the transmitted packets.  ...  We present a system that leverages this opportunity to enable n wireless nodes to create a shared secret S, in a way that an eavesdropper, Eve, obtains very little information on S.  ...  receivers that are in and out of the beam.  ... 
doi:10.1145/2500423.2500440 dblp:conf/mobicom/ArgyrakiDDFGK13 fatcat:6bks32o7prefrgonmqvg6coq4e

Double Layer Key: Integrated Verification of Relay Generated Node Key and User Based Mutual with Erasure Concepts

S. Soundararajan, S. Aswini, M. Namrutha, S. Sandhya
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
to create pair wise secrets and techniques that Eve knows very little about.  ...  Our protocol leverages the broadcast nature of the wireless to create pair sensible secrets and techniques among all pair of nodes concurrently has polynomial time complexity and is easily implementable  ...  CONCLUSION The two protocols for allowing a group of n wi-fi nodes to create pair wise secrets, inside the presence of a passive adversary, with restrained network presence, without assuming anything approximately  ... 
doi:10.23956/ijarcsse/v7i3/0160 fatcat:tdulcuc3ufhdbcwwpzva5nclwa

Secret message capacity of a line network [article]

Athanasios Papadopoulos, Laszlo Czap, Christina Fragouli
2014 arXiv   pre-print
We investigate the problem of information theoretically secure communication in a line network with erasure channels and state feedback.  ...  As a side result, we derive the secret key and secret message capacity of an one-hop network, when the source has limited randomness.  ...  So, doing time sharing between these two schemes can both create the maximum secret key and communicate the maximum amount of packets to the receiver.  ... 
arXiv:1407.1922v1 fatcat:tse5jvhks5expahbrv5bbjqega

Exploiting common randomness: A resource for network secrecy

Laszlo Czap, Vinod M. Prabhakaran, Suhas Diggavi, Christina Fragouli
2013 2013 IEEE Information Theory Workshop (ITW)  
The communication channels are erasure channels with strictly causal channel state information of the destination available publicly.  ...  A passive adversary is present in the system eavesdropping on any one of the channels. We design a linear scheme that ensures secrecy against the eavesdropper.  ...  In other words, we take advantage of the fact that none of the eavesdroppers has received both packets X 1 and X 2 , to create a new packet both sources still have and is also secret from both eavesdroppers  ... 
doi:10.1109/itw.2013.6691232 dblp:conf/itw/CzapPDF13 fatcat:4r6mo7eszraorkskil6qehnoey

On interactive secrecy over erasure networks

Laszlo Czap, Vinod M. Prabhakaran, Suhas Diggavi, Christina Fragouli
2012 2012 5th International Symposium on Communications, Control and Signal Processing  
In this short review paper we summarize some of our recent results on interactive message secrecy for broadcast erasure channels.  ...  As pointed out in [4] this makes a clear distinction between the secret key generation and secret message sending problem.  ...  This creates a erasure channel at every message level, with different erasure probabilities.  ... 
doi:10.1109/isccsp.2012.6217871 dblp:conf/isccsp/CzapPDF12 fatcat:tgi6pkacuzfujac4ubxjjz332u

SECRET KEYS AND THE PACKETS TRANSPORTATION FOR PRIVACY DATA FORWARDING METHOD IN CLOUD SERVER

P. Velavan .
2014 International Journal of Research in Engineering and Technology  
In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper Security.  ...  The Cloud computing is the process of storing the data in the Remote server. This process doesn't speak much about confidentiality and robustness of the data.  ...  ACKNOWLEDGMENTS We thank our HOD and staff members of SRM University for guiding us throughout our research.  ... 
doi:10.15623/ijret.2014.0303065 fatcat:gmfdiyypbnhivasfj4ma4iljli

Efficient uncoordinated FHSS anti-jamming communication

Mario Strasser, Christina Pöpper, Srdjan Čapkun
2009 Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '09  
We address the problem of jamming-resistant communication in scenarios in which the communicating parties do not share secret keys.  ...  In these cases, the deployment of shared secret keys is unrealistic, and therefore this problem cannot be solved using existing anti-jamming solutions like FHSS and DSSS that depend on pre-shared keys.  ...  The attacker, in turn, blocks communication on c b out of c channels.  ... 
doi:10.1145/1530748.1530778 dblp:conf/mobihoc/StrasserPC09 fatcat:asf5vme7yzcedpvpl3i34m3zmu

Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs

Yong Zeng, Xin Wang, Zhihong Liu, Jianfeng Ma, Lihua Dong
2014 Journal of Software  
The Delugebased protocols are the widely used code disseminations, however, which have to take much energy and memory to deal with the problem caused by out of order delivery of packets in WSNs.  ...  Rateless erasure codes based approaches can reduce the overhead, while failed in defeating DoS attacks.  ...  However, the rateless erasure code can avoid the out-of-order problem. As a result they cannot take full advantage of erasure codes, and consequently does not immediately authenticate packets.  ... 
doi:10.4304/jsw.9.1.190-194 fatcat:wxcjxazczbho3pdsx56n2lytta

Secret message capacity of erasure broadcast channels with feedback

Laszlo Czap, Vinod M. Prabhakaran, Christina Fragouli, Suhas Diggavi
2011 2011 IEEE Information Theory Workshop  
We characterize the secret message capacity of a wiretapped erasure channel where causal channel state information of the honest nodes is publicly available.  ...  Our work also demonstrates the value of causal public feedback, which has previously been shown for the secret key generation problem.  ...  Both Alice and Bob create the same n ((1 − δ)δ E − ) linear combinations of Bob's packets.  ... 
doi:10.1109/itw.2011.6089579 dblp:conf/itw/CzapPFD11 fatcat:hbqj7xw2krhd5mjgcpnycvwqqe

Secrecy Throughput of MANETs Under Passive and Active Attacks

Yingbin Liang, H. Vincent Poor, Lei Ying
2011 IEEE Transactions on Information Theory  
Index Terms-Erasure channel, mobile ad hoc network (MANET), mobility model, secrecy, throughput scaling, wiretap channel.  ...  A model under active attack is further studied, in which the malicious nodes actively attack the network by transmitting modified packets to the destination nodes.  ...  To create an equivalent discrete memoryless erasure wiretap channel, we need to guarantee that symbols in one codeword (that encodes one message) see independent erasure channels.  ... 
doi:10.1109/tit.2011.2165800 fatcat:kwlsp4rabjbtdalnyvqhwiq7vu

Secure Capacity Region for Erasure Broadcast Channels with Feedback [article]

László Czap and Vinod M. Prabhakaran and Suhas Diggavi and Christina Fragouli
2011 arXiv   pre-print
the packet erasure setting.  ...  on the transmitted signals, and we can build on these differences with the help of feedback to create secret keys [9, 10] .  ... 
arXiv:1110.5741v1 fatcat:ec6y433psze5rolpxy6tkhantq
« Previous Showing results 1 — 15 out of 1,099 results