Team for Research in
Ubiquitous Secure Technology

Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes
Adrian Perrig, Mark Luk, Cynthia Kuo

Citation
Adrian Perrig, Mark Luk, Cynthia Kuo. "Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes". Proceedings of the ACM Conference on Embedded Networked Sensor System (SenSys 2007), October, 2007.

Abstract
Existing protocols for secure key establishment all rely on an unspecified mechanism for initially deploying secrets to sensor nodes. However, no commercially viable and secure mechanism exists for initial setup. Without a guarantee of secure key deployment, the traffic over a sensor network cannot be presumed secure. To address this problem, we present a user-friendly protocol for the secure deployment of cryptographic keys in sensor networks. We propose a collection of five techniques to prevent an attacker from eavesdropping on key deployment. To demonstrate feasibility for real-world use, we implement our protocol on Telos motes and conduct a user study.

Electronic downloads

Citation formats  
  • HTML
    Adrian Perrig, Mark Luk, Cynthia Kuo. <a
    href="http://www.truststc.org/pubs/284.html"
    >Message-In-a-Bottle: User-Friendly and Secure Key
    Deployment for Sensor Nodes</a>, Proceedings of the
    ACM Conference on Embedded Networked Sensor System (SenSys
    2007), October, 2007.
  • Plain text
    Adrian Perrig, Mark Luk, Cynthia Kuo.
    "Message-In-a-Bottle: User-Friendly and Secure Key
    Deployment for Sensor Nodes". Proceedings of the ACM
    Conference on Embedded Networked Sensor System (SenSys
    2007), October, 2007.
  • BibTeX
    @inproceedings{PerrigLukKuo07_MessageInaBottleUserFriendlySecureKeyDeployment,
        author = {Adrian Perrig and Mark Luk and Cynthia Kuo},
        title = {Message-In-a-Bottle: User-Friendly and Secure Key
                  Deployment for Sensor Nodes},
        booktitle = {Proceedings of the ACM Conference on Embedded
                  Networked Sensor System (SenSys 2007)},
        month = {October},
        year = {2007},
        abstract = {Existing protocols for secure key establishment
                  all rely on an unspecified mechanism for initially
                  deploying secrets to sensor nodes. However, no
                  commercially viable and secure mechanism exists
                  for initial setup. Without a guarantee of secure
                  key deployment, the traffic over a sensor network
                  cannot be presumed secure. To address this
                  problem, we present a user-friendly protocol for
                  the secure deployment of cryptographic keys in
                  sensor networks. We propose a collection of five
                  techniques to prevent an attacker from
                  eavesdropping on key deployment. To demonstrate
                  feasibility for real-world use, we implement our
                  protocol on Telos motes and conduct a user study. },
        URL = {http://www.truststc.org/pubs/284.html}
    }
    

Posted by Adrian Perrig on 10 Sep 2007.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.