The search functionality is under construction.

The search functionality is under construction.

A wireless sensor network consists of spatially distributed devices using sensors to monitor physical and environmental conditions. Key infection is a key distribution protocol for wireless sensor networks with a partially present adversary; a sensor node wishing to communicate secretly with other nodes simply sends a symmetric encryption key in the clear. The partially present adversary can eavesdrop on only a small fraction of the keys. Secrecy amplification is a post-deployment strategy to improve the security of key infection by combining multiple keys propagated along different paths. The previous mathematical analysis of secrecy amplification assumes that sensor nodes always transmit packets at the maximum strength. We provide a mathematical analysis of secrecy amplification where nodes adjust their transmission power adaptively (a.k.a. whispering mode).

- Publication
- IEICE TRANSACTIONS on Information Vol.E102-D No.12 pp.2599-2602

- Publication Date
- 2019/12/01

- Publicized
- 2019/09/12

- Online ISSN
- 1745-1361

- DOI
- 10.1587/transinf.2019EDL8055

- Type of Manuscript
- LETTER

- Category
- Information Network

Dae HYUN YUM

Myongji University

The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.

Copy

Dae HYUN YUM, "Mathematical Analysis of Secrecy Amplification in Key Infection: The Whispering Mode" in IEICE TRANSACTIONS on Information,
vol. E102-D, no. 12, pp. 2599-2602, December 2019, doi: 10.1587/transinf.2019EDL8055.

Abstract: A wireless sensor network consists of spatially distributed devices using sensors to monitor physical and environmental conditions. Key infection is a key distribution protocol for wireless sensor networks with a partially present adversary; a sensor node wishing to communicate secretly with other nodes simply sends a symmetric encryption key in the clear. The partially present adversary can eavesdrop on only a small fraction of the keys. Secrecy amplification is a post-deployment strategy to improve the security of key infection by combining multiple keys propagated along different paths. The previous mathematical analysis of secrecy amplification assumes that sensor nodes always transmit packets at the maximum strength. We provide a mathematical analysis of secrecy amplification where nodes adjust their transmission power adaptively (a.k.a. whispering mode).

URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2019EDL8055/_p

Copy

@ARTICLE{e102-d_12_2599,

author={Dae HYUN YUM, },

journal={IEICE TRANSACTIONS on Information},

title={Mathematical Analysis of Secrecy Amplification in Key Infection: The Whispering Mode},

year={2019},

volume={E102-D},

number={12},

pages={2599-2602},

abstract={A wireless sensor network consists of spatially distributed devices using sensors to monitor physical and environmental conditions. Key infection is a key distribution protocol for wireless sensor networks with a partially present adversary; a sensor node wishing to communicate secretly with other nodes simply sends a symmetric encryption key in the clear. The partially present adversary can eavesdrop on only a small fraction of the keys. Secrecy amplification is a post-deployment strategy to improve the security of key infection by combining multiple keys propagated along different paths. The previous mathematical analysis of secrecy amplification assumes that sensor nodes always transmit packets at the maximum strength. We provide a mathematical analysis of secrecy amplification where nodes adjust their transmission power adaptively (a.k.a. whispering mode).},

keywords={},

doi={10.1587/transinf.2019EDL8055},

ISSN={1745-1361},

month={December},}

Copy

TY - JOUR

TI - Mathematical Analysis of Secrecy Amplification in Key Infection: The Whispering Mode

T2 - IEICE TRANSACTIONS on Information

SP - 2599

EP - 2602

AU - Dae HYUN YUM

PY - 2019

DO - 10.1587/transinf.2019EDL8055

JO - IEICE TRANSACTIONS on Information

SN - 1745-1361

VL - E102-D

IS - 12

JA - IEICE TRANSACTIONS on Information

Y1 - December 2019

AB - A wireless sensor network consists of spatially distributed devices using sensors to monitor physical and environmental conditions. Key infection is a key distribution protocol for wireless sensor networks with a partially present adversary; a sensor node wishing to communicate secretly with other nodes simply sends a symmetric encryption key in the clear. The partially present adversary can eavesdrop on only a small fraction of the keys. Secrecy amplification is a post-deployment strategy to improve the security of key infection by combining multiple keys propagated along different paths. The previous mathematical analysis of secrecy amplification assumes that sensor nodes always transmit packets at the maximum strength. We provide a mathematical analysis of secrecy amplification where nodes adjust their transmission power adaptively (a.k.a. whispering mode).

ER -