{"title":"Safe renewal of a random key pre-distribution scheme for trusted devices","authors":"M. Ramkumar","doi":"10.1109/IAW.2005.1495945","DOIUrl":null,"url":null,"abstract":"Evolving application scenarios involving ubiquitous, heterogeneous devices (some of which may be severely resource constrained) forming cooperative ad hoc networks, calls for a different model for \"trust\". It is the devices that are trusted - not the operators or the \"owners\" of the devices. Any security solution based on trusted devices demands mechanisms for read-proofing the secrets stored in tamper-resistant devices. However, as perfect tamper-resistance may not be feasible, for long-lived security of such deployments, it is essential that the stored secrets be renewed periodically. This paper addresses issues involved safe renewal of secrets stored in trusted devices. For safe renewal of keys, (irrespective of the key distribution scheme used) some assurances from technology for tamper-resistance is needed. In this paper the author address issues involved in safe renewal of a recently proposed random key pre-distribution scheme, HARPS (hashed random preloaded subsets) (Ramkumar, et al., 2005). The authors discuss: 1) some \"reasonable\" assurances that technology could provide (like partial tamper resistance and circuit-delay based authentication), and 2) possible security precautions and policies (like use of a pass-phrase, use of an additional stored secret, and rest encryption), and their effect on the security of HARPS.","PeriodicalId":252208,"journal":{"name":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAW.2005.1495945","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Evolving application scenarios involving ubiquitous, heterogeneous devices (some of which may be severely resource constrained) forming cooperative ad hoc networks, calls for a different model for "trust". It is the devices that are trusted - not the operators or the "owners" of the devices. Any security solution based on trusted devices demands mechanisms for read-proofing the secrets stored in tamper-resistant devices. However, as perfect tamper-resistance may not be feasible, for long-lived security of such deployments, it is essential that the stored secrets be renewed periodically. This paper addresses issues involved safe renewal of secrets stored in trusted devices. For safe renewal of keys, (irrespective of the key distribution scheme used) some assurances from technology for tamper-resistance is needed. In this paper the author address issues involved in safe renewal of a recently proposed random key pre-distribution scheme, HARPS (hashed random preloaded subsets) (Ramkumar, et al., 2005). The authors discuss: 1) some "reasonable" assurances that technology could provide (like partial tamper resistance and circuit-delay based authentication), and 2) possible security precautions and policies (like use of a pass-phrase, use of an additional stored secret, and rest encryption), and their effect on the security of HARPS.