Paper 2008/446
Secure Random Key Pre-Distribution Against Semi-Honest Adversaries
Mike Burmester, Reihaneh Safavi-Naini, and Gelareh Taban
Abstract
Recently, Eschenauer and Gligor [EG02] proposed a model (the EG-model) for random key pre-distribution in distributed sensor networks (DSN) that allows sensors to establish private shared keys. In this model, each sensor is randomly assigned a set of keys, called a key-ring, from a secret key-pool. Two nodes can communicate securely by using a shared key (direct key) or via a chain of shared keys (key-path). The authors show how the key-ring size can be chosen so that nodes are guaranteed to be linked either by direct keys or by key-paths. Security of this system is proven for an eavesdropping (passive) adversary. In this paper we assume the same key pre-distribution set-up but consider a semi-honest adversary. Semi-honest adversaries are privacy adversaries that have access to a fraction of the keys in the key pool, the compromised keys, but are otherwise passive, in the sense that they do not cause nodes to deviate from protocol executions (to remain undetectable). Since they can decrypt messages secured by key-paths with compromised keys, the security guarantees of the EG model break down. We revisit the security of key establishment in the presence of such adversaries and make a number of contributions. First, we show that it is possible to choose the size of the key-rings so that any two nodes can exchange a private key securely in the presence of a semi-honest adversary. Second, we give a protocol that achieves this guarantee and prove its security. Third, we introduce a new efficiency parameter for the EG-model that allows the protocol designer to trade-off the communication required for key establishment with the key-ring size. Finally, we propose a concrete key establishment protocol (based on the DSR protocol) that guarantees security in the presence of a semi-honest adversary.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Under Submission
- Keywords
- distributed cryptographykey managementsecret-key cryptography
- Contact author(s)
- gelareh @ umd edu
- History
- 2008-10-20: received
- Short URL
- https://ia.cr/2008/446
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2008/446, author = {Mike Burmester and Reihaneh Safavi-Naini and Gelareh Taban}, title = {Secure Random Key Pre-Distribution Against Semi-Honest Adversaries}, howpublished = {Cryptology {ePrint} Archive, Paper 2008/446}, year = {2008}, url = {https://eprint.iacr.org/2008/446} }