Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Secure Communication Over Radio Channels
 
conference paper

Secure Communication Over Radio Channels

Dolev, Shlomi
•
Gilbert, Seth  
•
Guerraoui, Rachid  
Show more
2008
Proceedings of the 27th Annual Symposium on Principles of Distributed Computing
27th Annual Symposium on Principles of Distributed Computing

We study the problem of secure communication in a multi-channel, single-hop radio network with a malicious adversary that can cause collisions and spoof messages. We assume no pre-shared secrets or trusted-third-party infrastructure. The main contribution of this paper is f-AME: a randomized (f)ast-(A)uthenticated (M)essage (E)xchange protocol that enables nodes to exchange messages in a reliable and authenticated manner. It runs in O(|E|t^2 log n) time and has optimal resilience to disruption, where E is the set of pairs of nodes that need to swap messages, n is the total number of nodes, C the number of channels, and t < C the number of channels on which the adversary can participate in each round. We then show how to use f-AME to establish of a shared secret group key, which can be used to implement a secure, reliable and authenticated long-lived communication service. The resulting service requires O(nt^3 log n) rounds for the setup phase, and O(t log n) rounds for an arbitrary pair to communicate. By contrast, existing solutions in this setting rely on pre-shared secrets, trusted third-party infrastructure, and/or the assumption that all interference is non-malicious.

  • Files
  • Details
  • Metrics
Type
conference paper
Author(s)
Dolev, Shlomi
Gilbert, Seth  
Guerraoui, Rachid  
Newport, Calvin
Date Issued

2008

Published in
Proceedings of the 27th Annual Symposium on Principles of Distributed Computing
Subjects

Wireless Radio Networks

•

Malicious (Byzantine) Interference

•

Randomized Algorithms

•

NCCR-MICS

•

NCCR-MICS/CL1

URL

URL

http://www.podc.org/podc2008/
Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
DCL  
Event nameEvent placeEvent date
27th Annual Symposium on Principles of Distributed Computing

Toronto, Canada

August, 2008

Available on Infoscience
June 5, 2008
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/26085
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés