Sciweavers

IACR
2016

Topology-based Plug-and-Play Key-Setup

8 years 8 months ago
Topology-based Plug-and-Play Key-Setup
Abstract. We study the use of known, well-connected network topology, to improve key setup and management. Specifically, we present the TopKeyS protocol, that uses such known-topology to allow easier, plug and play key distribution. Furthermore, ,TopKeyS improves security by limiting impact of key exposures: it ensures both perfect forward secrecy and proactive key refresh, re-establishing security after exposure. TopKeyS assumes a trusted the authentication server device, whose public key is known to all devices. This server is initialized with the network topology. We analyze the properties of the TopKeyS protocol and show sufficient topology conditions for its applicability. We prove its security against an attacker that is able control some of the devices in the network. We further present AR-TopKeyS, an improvement of TopKeyS that is secure even for Adversarial Routing.
Amir Herzberg, Yehonatan Kfir
Added 03 Apr 2016
Updated 03 Apr 2016
Type Journal
Year 2016
Where IACR
Authors Amir Herzberg, Yehonatan Kfir
Comments (0)