Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks with Unconditionally Secure Key Exchange

As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

[1]  Shio Kumar Singh,et al.  A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks , 2011 .

[2]  Carles Padró,et al.  Information Theoretic Security , 2013, Lecture Notes in Computer Science.

[3]  Mark G. Terwilliger,et al.  Overview of Sensor Networks , 2004 .

[4]  Laszlo B. Kish,et al.  Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff's law , 2005, physics/0509136.

[5]  J. F. Dynes,et al.  Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography , 2011, 1106.2675.

[6]  J. Skaar,et al.  Thermal blinding of gated detectors in quantum cryptography. , 2010, Optics express.

[7]  Laszlo B. Kish,et al.  UNCONDITIONALLY SECURE COMPUTERS, ALGORITHMS AND HARDWARE, SUCH AS MEMORIES, PROCESSORS, KEYBOARDS, FLASH AND HARD DRIVES , 2008, 0803.4479.

[8]  L. Kish,et al.  TOTALLY SECURE CLASSICAL NETWORKS WITH MULTIPOINT TELECLONING (TELEPORTATION) OF CLASSICAL BITS THROUGH LOOPS WITH JOHNSON-LIKE NOISE , 2006, physics/0603041.

[9]  Laszlo B. Kish,et al.  Cable Capacitance Attack against the KLJN Secure Key Exchange , 2015, Inf..

[10]  Laszlo B. Kish,et al.  On the security of the Kirchhoff-law–Johnson-noise (KLJN) communicator , 2013, Quantum Inf. Process..

[11]  Cheng-Chi Lee,et al.  An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks , 2013, Sensors.

[12]  Gang Qu,et al.  Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[13]  J. Skaar,et al.  Tailored bright illumination attack on distributed-phase-reference protocols , 2010, 1012.4366.

[14]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[15]  Horace P. Yuen,et al.  Essential elements lacking in security proofs for quantum key distribution , 2013, Optics/Photonics in Security and Defence.

[16]  Raju Dutta,et al.  Energy efficient modified SPIN protocol with high security in Wireless Sensor Networks using TOSSIM , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.

[17]  Laszlo B. Kish,et al.  Enhanced secure key exchange systems based on the Johnson-noise scheme , 2013, ArXiv.

[18]  Gerd Leuchs,et al.  Trojan-horse attacks threaten the security of practical quantum cryptography , 2014, 1406.5813.

[19]  Xiaolin Cao,et al.  Securing vehicle communication systems by the KLJN key exchange protocol , 2014, ArXiv.

[20]  Laszlo B. Kish,et al.  On the "cracking" scheme in the paper "A directional coupler attack against the Kish key distribution system" by Gunn, Allison and Abbott , 2014, ArXiv.

[21]  J. Scheuer,et al.  Noise in the wire: The real impact of wire resistance for the Johnson(-like) noise based secure communicator , 2010, 1002.0087.

[22]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[23]  Laszlo B. Kish,et al.  Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange , 2009, ArXiv.

[24]  Xiaohui Liang,et al.  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[25]  Gerd Leuchs,et al.  Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.

[26]  Srinivasa Rao,et al.  An Overview of Wireless Sensor Networks Applications and Security , 2012 .

[27]  Laszlo B. Kish RESPONSE TO FENG HAO'S PAPER "KISH'S KEY EXCHANGE SCHEME IS INSECURE" , 2006 .

[28]  S. Quartz,et al.  Getting to Know You: Reputation and Trust in a Two-Person Economic Exchange , 2005, Science.

[29]  Robert Mingesz,et al.  What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-Noise key exchange? , 2014, The Random and Fluctuating World.

[30]  Laszlo B. Kish,et al.  Enhanced usage of keys obtained by physical, unconditionally secure distributions , 2014, ArXiv.

[31]  Laszlo B. Kish,et al.  Unconditional Security by the Laws of Classical Physics , 2013 .

[32]  Audun Jøsang,et al.  Trust network analysis with subjective logic , 2006, ACSC.

[33]  Vadim Makarov,et al.  Comment on “Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography” [Appl. Phys. Lett. 98, 231104 (2011)] , 2011, 1106.3756.

[34]  BoukercheAzzedine,et al.  A trust-based security system for ubiquitous and pervasive computing environments , 2008 .

[35]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[36]  Annapurna Jonnalagadda,et al.  A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2015 .

[37]  Vadim Makarov,et al.  Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..

[38]  Christian Kurtsiefer,et al.  Experimentally faking the violation of Bell's inequalities. , 2011, Physical review letters.

[39]  Chun Chen,et al.  Security Analysis and Improvement of a Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks , 2013, IEEE Transactions on Industrial Electronics.

[40]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[41]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[42]  Derek Abbott,et al.  Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme , 2013, PloS one.

[43]  Xiaolin Cao,et al.  On KLJN-based secure key distribution in vehicular communication networks , 2014, The Random and Fluctuating World.

[44]  Rabi N. Mahapatra,et al.  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[45]  Laszlo B. Kish,et al.  Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System , 2014, Entropy.

[46]  Deborah Estrin,et al.  Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.

[47]  Rosli Salleh,et al.  Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[48]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[49]  Eman Shaaban,et al.  Enhancing S-LEACH security for wireless sensor networks , 2012, 2012 IEEE International Conference on Electro/Information Technology.

[50]  Muhammad Zahir Shah,et al.  Security and Privacy Issues in Wireless Sensor Networks , 2011 .

[51]  J. Skaar,et al.  After-gate attack on a quantum cryptosystem , 2010, 1009.2683.

[52]  Robert S. Balog,et al.  Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters , 2013, PloS one.

[53]  Robert Mingesz,et al.  Noise Properties in the Ideal Kirchhoff-Law-Johnson-Noise Secure Communication System , 2014, PloS one.

[54]  Bernd Lahno,et al.  Is Trust the Result of Bayesian Learning , 2004 .

[55]  Laszlo B. Kish,et al.  Do electromagnetic waves exist in a short cable at low frequencies? What does physics say? , 2014, The Random and Fluctuating World.

[56]  Yao Liang,et al.  Towards Long-Term Multi-Hop WSN Deployments for Environmental Monitoring: An Experimental Network Evaluation , 2014, J. Sens. Actuator Networks.

[57]  Ferdinand Peper,et al.  Information Networks Secured by the Laws of Physics , 2011, IEICE Trans. Commun..

[58]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[59]  A. Jain,et al.  Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[60]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[61]  Horace P. Yuen,et al.  On the Foundations of Quantum Key Distribution - Reply to Renner and Beyond , 2012 .

[62]  J. Skaar,et al.  Controlling a superconducting nanowire single-photon detector using tailored bright illumination , 2011, 1106.2396.

[63]  Chiman Kwan,et al.  Physical uncloneable function hardware keys utilizing Kirchhoff-law-Johnson-noise secure key exchange and noise-based logic , 2013, ArXiv.

[64]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[65]  Cui Li,et al.  Overview of Wireless Sensor Networks , 2005 .

[66]  L. Kish,et al.  Johnson(-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line ✩ , 2006, physics/0612153.

[67]  Laszlo B. Kish PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY , 2006 .

[68]  Laszlo B. Kish,et al.  Analysis of an attenuator artifact in an experimental attack by Gunn-Allison-Abbott against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system , 2014, ArXiv.

[69]  Robert S. Balog,et al.  Resource Requirements and Speed versus Geometry of Unconditionally Secure Physical Key Exchanges , 2015, Entropy.