Please use this identifier to cite or link to this item:
Title: GossiCrypt : wireless sensor network data confidentiality against parasitic adversaries
Authors: Luo, Jun.
Panagiotis Papadimitratos.
Hubaux, Jean-Pierre.
Keywords: DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks
Issue Date: 2008
Source: Luo, J., Panagiotis, P., & Hubaux, J. P. (2008). GossiCrypt : wireless sensor network data confidentiality against parasitic adversaries. IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (5th:2008:San Francisco).
Abstract: Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adversary, which seeks to exploit sensor networks by obtaining measurements in an unauthorized way. Our low-complexity solution, GossiCrypt, leverages on the large scale of sensor networks to protect confidentiality efficiently and effectively. GossiCrypt protects data by symmetric key encryption at their source nodes and re-encryption at a randomly chosen subset of nodes en route to the sink. Furthermore, it employs key refreshing to mitigate the physical compromise of cryptographic keys. We validate GossiCrypt analytically and with simulations, showing it protects data confidentiality with probability almost one. Moreover, compared with a system that uses public-key data encryption, the energy consumption of GossiCrypt is tens to thousands of times lower.
DOI: 10.1109/SAHCN.2008.60
Rights: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks © 2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Conference Papers

Files in This Item:
File Description SizeFormat 
140292_1.pdfConference paper249.22 kBAdobe PDFThumbnail

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.