Key Establishment in Multi-core Parallel Systems

The trend toward high processing power at a reasonable cost continues with the emergence of multi-core architectures with large number of cores. In such computing systems, a major technological challenge is to design the internal, on-chip communication network.This not only depends on high performance in latency, bandwidth, and fairness in contention under heavy loads, but also depends on an efficient authentication mechanism and protection of integrity and privacy of applications from hardware and software attacks. In this paper, we present a technique to establish secret keys for the cores employed by the same application to communicate securely. Our approach is based on key pre-distribution, in which each of the cores chooses a number of keys from a large key pool. When a group of cores are employed by an application, they discover their shared keys and establish a group key for secured communication. The key discovery and the process to connect partitioned groups use space-efficient Bloom filter to ensure the security and efficiency of the key establishment process. Our performance evaluation demonstrates the efficiency of the proposed framework.

[1]  Deep Medhi,et al.  Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach , 2007, TOSN.

[2]  Yunghsiang Sam Han,et al.  Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission , 2008, IEEE Transactions on Dependable and Secure Computing.

[3]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[4]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[5]  G. Edward Suh,et al.  Aegis: A Single-Chip Secure Processor , 2007, IEEE Des. Test Comput..

[6]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.

[7]  Michael Mitzenmacher,et al.  Compressed bloom filters , 2001, PODC '01.

[8]  Martin Hopkins,et al.  Synergistic Processing in Cell's Multicore Architecture , 2006, IEEE Micro.

[9]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[10]  Weijia Jia,et al.  Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[11]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[12]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[13]  Richard M. Karp,et al.  Efficient Randomized Pattern-Matching Algorithms , 1987, IBM J. Res. Dev..

[14]  Shekhar Borkar Thousand Core ChipsA Technology Perspective , 2007, DAC 2007.

[15]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[16]  Deep Medhi,et al.  A Byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[17]  Fabrizio Petrini,et al.  Cell Multiprocessor Communication Network: Built for Speed , 2006, IEEE Micro.

[18]  Yunghsiang Sam Han,et al.  Using MDS Codes for the Key Establishment of Wireless Sensor Networks , 2005, MSN.

[19]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[20]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[21]  Vipul Gupta,et al.  Accelerating next-generation public-key cryptosystems on general-purpose CPUs , 2005, IEEE Micro.

[22]  Li Shang,et al.  Three-dimensional multiprocessor system-on-chip thermal optimization , 2007, 2007 5th IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).

[23]  Donggang Liu,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.

[24]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[25]  K. J. Ray Liu,et al.  Index of Terms , 2016 .

[26]  James D. Warnock,et al.  Cell processor low-power design methodology , 2005, IEEE Micro.

[27]  Peng Ning,et al.  Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.

[28]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[29]  S. Asano,et al.  The design and implementation of a first-generation CELL processor , 2005, ISSCC. 2005 IEEE International Digest of Technical Papers. Solid-State Circuits Conference, 2005..

[30]  Andrei Broder,et al.  Network Applications of Bloom Filters: A Survey , 2004, Internet Math..

[31]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[32]  Pradeep Dubey,et al.  Platform 2015: Intel ® Processor and Platform Evolution for the Next Decade , 2005 .

[33]  H BloomBurton Space/time trade-offs in hash coding with allowable errors , 1970 .

[34]  G. Edward Suh,et al.  Aegis: A Single-Chip Secure Processor , 2007, IEEE Design & Test of Computers.

[35]  Shekhar Y. Borkar,et al.  Thousand Core ChipsA Technology Perspective , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[36]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[37]  Yunghsiang Sam Han,et al.  Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.