An Asymptotic secrecy model and its applications in sensor networks

Show full item record

Title: An Asymptotic secrecy model and its applications in sensor networks
Author: Yuan, Bo
Abstract: This paper proposes a new model for secure communication channels between two parties. The new model assumes that adversaries are storage space bounded, but not computationally bounded. At the initial phase of the secret communication, both parties exchange a large amount of random bits so that adversaries are not able to save them due to the storage space limitation. Each party only saves received data. At the second phase, each party regenerates the random bits, combines them with received data, and generates an encryption key iteratively with a one-way hash function. The key is then used to encrypt the future transmissions from one party to the other. After each transmission, the key is updated iteratively based on data received. Applications of the new model are also discussed.
Description: "An Asymptotic secrecy model and its applications in sensor networks," Proceedings of The Second Upstate New York Workshop on Communications and Networking. Held in Rochester, New York: November 2005.
Record URI: http://hdl.handle.net/1850/8078
Date: 2005

Files in this item

Files Size Format View
BYuanConfProc11-2005.pdf 182.4Kb PDF View/Open

The following license files are associated with this item:

This item appears in the following Collection(s)

Show full item record

Search RIT DML


Advanced Search

Browse