TY - GEN
T1 - Secure communication over radio channels
AU - Dolev, Shlomi
AU - Gilbert, Seth
AU - Guerraoui, Rachid
AU - Newport, Calvin
PY - 2008/1/1
Y1 - 2008/1/1
N2 - We study the problem of secure communication in a multichannel, single-hop radio network with a malicious adversary that can cause collisions and spoof messages. We assume no pre-shared secrets or trusted-third-party infrastructure. The main contribution of this paper is f-AME: a randomized (f)ast-(A) uthenticated (M)essage (E)xchange protocol that enables nodes to exchange messages in a reliable and authenticated manner. It runs in O(|E|t 2log n) time and has optimal resilience to disruption, where E is the set of pairs of nodes that need to swap messages, n is the total number of nodes, C the number of channels, and t < C the number of channels on which the adversary can participate in each round. We show how to use f-AME to establish a shared secret group key, which can be used to implement a secure, reliable and authenticated long-lived communication service. The resulting service requires O(nt3 log n) rounds for the setup phase, and O(t log n) rounds for an arbitrary pair to communicate. By contrast, existing solutions rely on preshared secrets, trusted third-party infrastructure, and/or the assumption that all interference is non-malicious.
AB - We study the problem of secure communication in a multichannel, single-hop radio network with a malicious adversary that can cause collisions and spoof messages. We assume no pre-shared secrets or trusted-third-party infrastructure. The main contribution of this paper is f-AME: a randomized (f)ast-(A) uthenticated (M)essage (E)xchange protocol that enables nodes to exchange messages in a reliable and authenticated manner. It runs in O(|E|t 2log n) time and has optimal resilience to disruption, where E is the set of pairs of nodes that need to swap messages, n is the total number of nodes, C the number of channels, and t < C the number of channels on which the adversary can participate in each round. We show how to use f-AME to establish a shared secret group key, which can be used to implement a secure, reliable and authenticated long-lived communication service. The resulting service requires O(nt3 log n) rounds for the setup phase, and O(t log n) rounds for an arbitrary pair to communicate. By contrast, existing solutions rely on preshared secrets, trusted third-party infrastructure, and/or the assumption that all interference is non-malicious.
KW - Malicious (byzantine) interference
KW - Randomized algorithms
KW - Wireless radio networks
UR - http://www.scopus.com/inward/record.url?scp=57549101228&partnerID=8YFLogxK
U2 - 10.1145/1400751.1400767
DO - 10.1145/1400751.1400767
M3 - Conference contribution
AN - SCOPUS:57549101228
SN - 9781595939890
T3 - Proceedings of the Annual ACM Symposium on Principles of Distributed Computing
SP - 105
EP - 114
BT - PODC'08
PB - Association for Computing Machinery (ACM)
T2 - 27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing
Y2 - 18 August 2008 through 21 August 2008
ER -