Abstract
We study the problem of secure communication in a multichannel, single-hop radio network with a malicious adversary that can cause collisions and spoof messages. We assume no pre-shared secrets or trusted-third-party infrastructure. The main contribution of this paper is f-AME: a randomized (f)ast-(A) uthenticated (M)essage (E)xchange protocol that enables nodes to exchange messages in a reliable and authenticated manner. It runs in O(|E|t 2log n) time and has optimal resilience to disruption, where E is the set of pairs of nodes that need to swap messages, n is the total number of nodes, C the number of channels, and t < C the number of channels on which the adversary can participate in each round. We show how to use f-AME to establish a shared secret group key, which can be used to implement a secure, reliable and authenticated long-lived communication service. The resulting service requires O(nt3 log n) rounds for the setup phase, and O(t log n) rounds for an arbitrary pair to communicate. By contrast, existing solutions rely on preshared secrets, trusted third-party infrastructure, and/or the assumption that all interference is non-malicious.
| Original language | English |
|---|---|
| Title of host publication | PODC'08 |
| Subtitle of host publication | Proceedings of the 27th Annual ACM Symposium on Principles of Distributed Computing |
| Publisher | Association for Computing Machinery (ACM) |
| Pages | 105-114 |
| Number of pages | 10 |
| ISBN (Print) | 9781595939890 |
| DOIs | |
| State | Published - 1 Jan 2008 |
| Event | 27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing - Toronto, ON, Canada Duration: 18 Aug 2008 → 21 Aug 2008 |
Publication series
| Name | Proceedings of the Annual ACM Symposium on Principles of Distributed Computing |
|---|
Conference
| Conference | 27th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing |
|---|---|
| Country/Territory | Canada |
| City | Toronto, ON |
| Period | 18/08/08 → 21/08/08 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 9 Industry, Innovation, and Infrastructure
Keywords
- Malicious (byzantine) interference
- Randomized algorithms
- Wireless radio networks
ASJC Scopus subject areas
- Software
- Hardware and Architecture
- Computer Networks and Communications
Fingerprint
Dive into the research topics of 'Secure communication over radio channels'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver