Skip to main content

Using Zero Knowledge to Share a Little Knowledge: Bootstrapping Trust in Device Networks

  • Conference paper
Stabilization, Safety, and Security of Distributed Systems (SSS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6976))

Included in the following conference series:

Abstract

In device networks, trust must often be established in the field despite limited a priori knowledge of the network and the possibility of adversaries in the network environment. This paper presents a solution to the problem of bootstrapping trust that is minimal in the sense that it circumvents ongoing maintenance of security material. Specifically, security material is communicated to members of a device group just once by using zero knowledge identification in a new and efficient way, whereby devices in the group may henceforth securely verify each other as well as initialize mutual keys for confidentiality without needing to update that security material over time. In its basic form, the solution uses a base station to communicate the security material for group membership verification. The solution allows for scaling by letting the base station hierarchically delegate the task of bootstrapping to subordinate trusted nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anshul, D., Roy, S.: A zero-knowledge-proof identification scheme for base nodes in wireless sensor networks. In: ACM Symposium on Applied Computing, pp. 319–323 (2005)

    Google Scholar 

  2. Aronssona, H.A.: Zero knowledge protocols and small systems, http://www.tml.hut.fi/Opinnot/Tik-110.501/1995/zeroknowledge.html

  3. Arora, A., Sang, L.: Dialog codes for secure wireless communications. In: IPSN, pp. 13–24 (2009)

    Google Scholar 

  4. Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key cryptography for rfid-tags. In: PerCom Workshops, pp. 217–222 (2007)

    Google Scholar 

  5. Bellare, M., Goldreich, O.: On defining proofs of knowledge. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 390–420. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  6. Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Chung, A., Roedig, U.: DHB-KEY: An efficient key distribution scheme for wireless sensor networks. In: Proceedings of the 4th IEEE International Workshop on Wireless and Sensor Networks Security, WSNS 2008 (2008)

    Google Scholar 

  8. Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal on Computing 18(208) (1989)

    Google Scholar 

  9. Guillou, L.C., Quisquater, J.: A Paradoxical identity-based signature scheme resulting from zero-knowledge. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 216–231. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  10. Kizza, J.M.: Feige-fiat-shamir zkp scheme revisited. International Journal of Computing and ICT Research 4(1), 9–19 (2010)

    Google Scholar 

  11. Lederer, C., Mader, R., Koschuch, M., Großschädl, J., Szekely, A., Tillich, S.: Energy-efficient implementation of ECDH key exchange for wireless sensor networks. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) WISTP 2009. LNCS, vol. 5746, pp. 112–127. Springer, Heidelberg (2009)

    Google Scholar 

  12. Liu, A., Ning, P.: Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN, pp. 245–256 (2008)

    Google Scholar 

  13. Malan, D.J., Welsh, M., Smith, M.D.: Implementing public-key infrastructure for sensor networks. TOSN 4(4) (2008)

    Google Scholar 

  14. Munivel, E., Ajit, G.M.: Efficient public key infrastructure implementation in wireless sensor networks. In: ICWCSC, pp. 1–6 (2010)

    Google Scholar 

  15. Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 31–53. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  16. Perrig, A., Canetti, R.R., Tygar, J.D., Song, D.: The tesla broadcast authentication protocol. In: CryptoBytes, pp. 2–13 (2002)

    Google Scholar 

  17. Roman, R., Alcaraz, C.: Applicability of public key infrastructures in wireless sensor networks. In: López, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 313–320. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  18. Sang, L., Arora, A.: A shared-secret free security infrastructure for wireless networks. To appear in ACM Transactions on Autonomous and Adaptive Systems

    Google Scholar 

  19. Schnorr, C.P.: Efficient identification and signatures for smart cards. In: CRYPTO (1990)

    Google Scholar 

  20. Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: Nanoecc: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  21. Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115–131. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  22. Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. 1355–1387 (1975)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ramzy, I., Arora, A. (2011). Using Zero Knowledge to Share a Little Knowledge: Bootstrapping Trust in Device Networks. In: Défago, X., Petit, F., Villain, V. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2011. Lecture Notes in Computer Science, vol 6976. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24550-3_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24550-3_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24549-7

  • Online ISBN: 978-3-642-24550-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics