Creating Secrets out of Erasures. Argyraki, K., Diggavi, S., Duarte Gelvez, M., Fragouli, C., Gkatzianas, M. A., & Kostopoulos, P. In Proceedings of the ACM Conference on Mobile Computing and Networking (MobiCom), 2013. event-place: Miami, Florida, USA
doi  abstract   bibtex   
Current security systems often rely on the adversary's computational limitations. Wireless networks offer the opportunity for a different, complementary kind of security, which relies on the adversary's limited network presence (i.e., that the adversary cannot be located at many different points in the network at the same time). We present a system that leverages this opportunity to enable N wireless nodes to create a shared secret S, in a way that an eavesdropper, Eve, obtains very little information on S. Our system consists of two steps: (1) The nodes transmit packets following a special pattern, such that Eve learns very little about a given fraction of the transmitted packets. This is achieved through a combination of beam forming (from many different sources) and wiretap codes. (2) The nodes participate in a protocol that reshuffles the information known to each node, such that the nodes end up sharing a secret that Eve knows very little about. Our protocol is easily implementable in existing wireless devices and scales well with the number of nodes; these properties are achieved through a combination of public feedback, broadcasting, and network coding. We evaluate our system through a 5-node testbed. We demonstrate that a group of wireless nodes can generate thousands of new shared secret bits per second, with their secrecy being independent of the adversary's computational capabilities.
@inproceedings{argyraki_creating_2013,
 abstract = {Current security systems often rely on the adversary's computational limitations. Wireless networks offer the opportunity for a different, complementary kind of security, which relies on the adversary's limited network presence (i.e., that the adversary cannot be located at many different points in the network at the same time). We present a system that leverages this opportunity to enable N wireless nodes to create a shared secret S, in a way that an eavesdropper, Eve, obtains very little information on S. Our system consists of two steps: (1) The nodes transmit packets following a special pattern, such that Eve learns very little about a given fraction of the transmitted packets. This is achieved through a combination of beam forming (from many different sources) and wiretap codes. (2) The nodes participate in a protocol that reshuffles the information known to each node, such that the nodes end up sharing a secret that Eve knows very little about. Our protocol is easily implementable in existing wireless devices and scales well with the number of nodes; these properties are achieved through a combination of public feedback, broadcasting, and network coding. We evaluate our system through a 5-node testbed. We demonstrate that a group of wireless nodes can generate thousands of new shared secret bits per second, with their secrecy being independent of the adversary's computational capabilities.},
 type={4},
 author = {Argyraki, K. and Diggavi, Suhas and Duarte Gelvez, Melissa and Fragouli, C. and Gkatzianas, Marios Apostolos and Kostopoulos, Panagiotis},
 booktitle = {Proceedings of the {ACM} {Conference} on {Mobile} {Computing} and {Networking} ({MobiCom})},
 doi = {10.1145/2500423.2500440},
 keywords = {Group secret agreement, Physical-layer security},
 note = {event-place: Miami, Florida, USA},
 tags = {security},
 title = {Creating {Secrets} out of {Erasures}},
 year = {2013}
}

Downloads: 0