Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Revisiting Shamir's no-key protocol: Lightweight key transport
Date
2018-03-29
Author
Kılıç, Adnan
Onur, Ertan
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
124
views
0
downloads
Cite This
Key-transport protocols, subclasses of key-establishment protocols, are employed to convey secret keys from a principal to another for establishing a security association. In this paper, we propose a lightweight, practicable, tweakable, energy-efficient, and secure key-transport protocol, suitable forwireless sensor networks (WSN), Internet of Things (IoT) and mobile networks. The proposed protocol is based on the Shamir's no-key protocol. Although Shamir's no-key protocol does not require any pre-shared secret between principals, we show that it is impossible to employ the no-key protocol over publiccommutative groups. We modify Diffie-Hellman key-agreement protocol to morph it into a key-transport protocol by applying a set of changes on the original protocol and it becomes possible to compare both protocols in terms of memory usage and total time to accomplish a single key transport. The experimental results show that the proposed key transport protocol perform faster than the modified Diffie-Hellman protocol, and the total time to transport a single key by using the modified Diffie-Hellman protocol grows drastically with the increase in key size.
Subject Keywords
Key transport protocols
,
Wireless sensor networks
,
Internet of things
URI
https://hdl.handle.net/11511/46374
DOI
https://doi.org/10.1109/dasc-picom-datacom-cyberscitec.2017.103
Collections
Department of Computer Engineering, Conference / Seminar
Suggestions
OpenMETU
Core
Revisiting Shamir’s no-key protocol: a lightweight key transport protocol
Kılıç, Adnan; Onur, Ertan; Betin Onur, Cansu; Department of Computer Engineering (2017)
Key-transport protocols, subclasses of key-establishment protocols, are employed to convey secret keys from a principal to another to let them establish a security association. In this thesis, we propose a lightweight, practicable, energy-efficient, and secure key-transport protocol, convenient for wireless sensor networks (WSN), the Internet of things (IoT) and mobile networks. The proposed protocol is based on the Shamir’s three-pass (no-key) protocol. Although Shamir’s three-pass protocol does not requir...
Implementation of an Enhanced Target Localization and Identification Algorithm on a Magnetic WSN
Baghaee, Sajjad; GÜRBÜZ, SEVGİ ZÜBEYDE; Uysal, Elif (2015-10-01)
Wireless sensor networks (WSNs) are ubiquitous in a wide range of applications requiring the monitoring of physical and environmental variables, such as target localization and identification. One of these applications is the sensing of ferromagnetic objects. In typical applications, the area to be monitored is typically large compared to the sensing radius of each magnetic sensor. On the other hand, the RF communication radii of WSN nodes are invariably larger than the sensing radii. This makes it economic...
Quantum Key Distribution and Recent Advancements
Demir, Nazlı Ceren; Yayla, Oğuz; Department of Cryptography (2021-2-10)
Güvenli anahtar değişiminin sağlanması simetrik anahtar ile şifrelemede önemli bir konudur. Kuantum bilgisayarların geliştirilmesiyle günümüzde kullanımda olan sistemlerin güvenlik ihtiyacını karşılamayacağı değerlendirilmektedir. Bu doğrultuda öne çıkan önemli bir araştırma konusu kuantum anahtar değişimidir. Bu bitirme projesi, ilk kuantum anahtar değişimi protokolü olan BB84 Protokolünü ve kuantum anahtar paylaşımında son dönemde meydana gelen gelişmeleri ele almaktadır.
Impossibility of Three Pass Protocol using Public Abelian Groups
Onur, Cansu Betin; Kılıç, Adnan; Onur, Ertan (2018-7-23)
Key transport protocols are designed to transfer a secret key from an initiating principal to other entities in a network. The three-pass protocol is a key transport protocol developed by Adi Shamir in 1980 where Alice wants to transport a secret message to Bob over an insecure channel, and they do not have any pre-shared secret information. In this paper, we prove the impossibility of secret key transportation from a principal to another entity in a network by using the three pass protocol over public Abel...
Feature Extraction and Object Classification for Target Identification at Wireless Multimedia Sensor Networks
Civelek, Muhsin; Yilmazer, Cengiz; Yazıcı, Adnan; Korkut, Fazli Oncul (2014-04-25)
In this paper, it is investigated the processes for automatic identification of the targets without personnel intervention in wireless multimedia sensor networks. Methods to extract the features of the object from the multimedia data and to classify the target type based on the extracted features are proposed within the scope of this study. The success of the proposed methods are tested by implementing a Matlab application and the results are presented in this paper
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
A. Kılıç and E. Onur, “Revisiting Shamir’s no-key protocol: Lightweight key transport,” 2018, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/46374.