2019
DOI: 10.1007/s00779-019-01226-z
|View full text |Cite
|
Sign up to set email alerts
|

Optimal secret sharing for wireless information security in the era of Internet of Things

Abstract: Secret sharing is crucial to information security in wireless communications in the era of Internet of Things. In this paper, we study how to optimally share secrets between two and more users using the effect of wireless channel dynamics on the data link layer. For the two-user case, we formulate an optimization problem whose objective is to minimize the expectation of the probability that an eavesdropper receives all secret sharing packets. Our contributions are as follows: (i) we come up with the secret sha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…In this paper, the random distribution problem in service orientation under ubiquitous computing environment is studied, and the method to solve the np-complete problem is proposed. Meanwhile, the application conditions and the proof process of the solution are given [7,8]. Sensor physical devices such as the various functions of abstraction and combination then packaged into different services, according to different service design standard unified management and integrated distribution platform; at the same time, they point out that such a serviceoriented design can more quickly and easily build a variety of new applications for users [9].…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, the random distribution problem in service orientation under ubiquitous computing environment is studied, and the method to solve the np-complete problem is proposed. Meanwhile, the application conditions and the proof process of the solution are given [7,8]. Sensor physical devices such as the various functions of abstraction and combination then packaged into different services, according to different service design standard unified management and integrated distribution platform; at the same time, they point out that such a serviceoriented design can more quickly and easily build a variety of new applications for users [9].…”
Section: Introductionmentioning
confidence: 99%
“…Case 1: 1 ∈ (0, 1), 2 ∈ (0, 1), and 1 − 1 − 2 = 0. It yields that (11) = ( 12) > (13). There are two solutions that ensure 1 , 2 , and 1 − 1 − 2 are not all positive and less than 1.…”
Section: Numerical Examplementioning
confidence: 99%
“…The idea behind works along this line is as follows: Alice and Bob keep sending each other unicast packets without retry, using which the secret is derived; Eve would eventually lose a packet and be unable to figure out the secret even if she knew exactly the mechanism Alice and Bob use. More details of this approach can be found in our previous work 13 where we discuss optimal secret sharing between Alice and Bob with the presence of Eve. Specifically, we assume in 13 that Eve's location is random, and only Alice and Bob can choose how to generate the secret; we show that when the probability of successfully transmitting a packet is monotonically decreasing with the transmission distance and Eve's location is uniformly distributed, the optimal strategy for Alice and Bob to minimize the probability that Eve figures out the secret is to generate half of the secret from each one of them.…”
Section: Introductionmentioning
confidence: 99%
“…Rabiah [42,43] extended the work in [34] further for IoT devices by adding authentication: one master key and an initial session key are provided to all nodes at startup, and the subsequent session keys change over time. Our previous work in [44] discussed optimal secret sharing between Alice and Bob with the presence of Eve. In particular, we assumed that Eve's location is random, and only Alice and Bob can choose how to generate the secret; we showed that when the probability of successfully transmitting a packet is monotonically decreasing with the transmission distance and Eve's location is uniformly distributed, the optimal strategy for Alice and Bob to successfully share the secret is to generate half of the packets from each one of them.…”
Section: Introductionmentioning
confidence: 99%