{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:35:26Z","timestamp":1760240126296,"version":"build-2065373602"},"reference-count":24,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T00:00:00Z","timestamp":1550707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001824","name":"Grantov\u00e1 Agentura \u010cesk\u00e9 Republiky","doi-asserted-by":"publisher","award":["GBP202\/12\/G061"],"award-info":[{"award-number":["GBP202\/12\/G061"]}],"id":[{"id":"10.13039\/501100001824","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. In our previous work, we presented two approaches for the design of dynamic protocols for link key (re-)establishment in ad hoc networks, using two elements studied earlier\u2014secrecy amplification and key extraction from radio channel fading. The goal of this article is to provide a unified approach to the design of these protocols, together with their experimental verification, in a real network with various settings. The overall results of our experiments show that our dynamic combination of secrecy amplification and key extraction from radio channel fading saves a significant portion of messages with corresponding energy expenditure and can adapt to a much wider scale of environments when compared to previous solutions based on the exploitation of the individual elements of secrecy amplification and key extraction from radio channel fading.<\/jats:p>","DOI":"10.3390\/s19040914","type":"journal-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T03:49:44Z","timestamp":1550807384000},"page":"914","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0981-5700","authenticated-orcid":false,"given":"Lukas","family":"Nemec","sequence":"first","affiliation":[{"name":"Centre for Research on Cryptography and Security, Faculty of Informatics, Masaryk University, Brno 60200, Czech Republic"}]},{"given":"Vashek","family":"Matyas","sequence":"additional","affiliation":[{"name":"Centre for Research on Cryptography and Security, Faculty of Informatics, Masaryk University, Brno 60200, Czech Republic"}]},{"given":"Radim","family":"Ostadal","sequence":"additional","affiliation":[{"name":"Centre for Research on Cryptography and Security, Faculty of Informatics, Masaryk University, Brno 60200, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9784-7624","authenticated-orcid":false,"given":"Petr","family":"Svenda","sequence":"additional","affiliation":[{"name":"Centre for Research on Cryptography and Security, Faculty of Informatics, Masaryk University, Brno 60200, Czech Republic"}]},{"given":"Pierre-Louis","family":"Palant","sequence":"additional","affiliation":[{"name":"Institut National des Sciences Appliqu\u00e9es Centre Val de Loire, 18000 Bourges, France"}]}],"member":"1968","published-online":{"date-parts":[[2019,2,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"\u0160venda, P., Sekanina, L., and Maty\u00e1\u0161, V. (2009, January 16\u201319). Evolutionary design of secrecy amplification protocols for wireless sensor networks. Proceedings of the Second ACM Conference on Wireless Network Security, Zurich, Switzerland.","DOI":"10.1145\/1514274.1514306"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Nemec, L., Ostadal, R., Matyas, V., and Svenda, P. (2018, January 18\u201320). Adaptive Secrecy Amplification with Radio Channel Key Extraction. Proceedings of the 2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS), New York, NY, USA.","DOI":"10.1109\/DCOSS.2018.00028"},{"key":"ref_3","unstructured":"Turan, M., Barker, E., Kelsey, J., McKay, K., Baish, M., and Boyle, M. (2016). NIST Second DRAFT Special Publication 800-90b Recommendation for the Entropy Sources Used for Random Bit Generation, NIST."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Nemec, L., Ostadal, R., Matyas, V., and Svenda, P. (2018). Entropy Crowdsourcing\u2014Protocols for Link Key Updates in Wireless Sensor Networks. Security Protocols XXVI, Springer International Publishing.","DOI":"10.1007\/978-3-030-03251-7_9"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.entcs.2005.09.043","article-title":"Smart Dust Security\u2014Key Infection Revisited","volume":"157","author":"Cvrcek","year":"2006","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"ref_6","unstructured":"Anderson, R., Chan, H., and Perrig, A. (2004, January 8). Key infection: Smart trust for smart dust. Proceedings of the 12th IEEE International Conference on Network Protocols, Berlin, Germany."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1109\/18.748999","article-title":"Unconditionally secure key agreement and the intrinsic conditional information","volume":"45","author":"Maurer","year":"1999","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Mathur, S., Trappe, W., Mandayam, N., Ye, C., and Reznik, A. (2008, January 14\u201319). Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, CA, USA.","DOI":"10.1145\/1409944.1409960"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., and Krishnamurthy, S.V. (2009, January 20\u201325). On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments. Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, Beijing, China.","DOI":"10.1145\/1614320.1614356"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Azimi-Sadjadi, B., Kiayias, A., Mercado, A., and Yener, B. (2007, January 29). Robust key generation from signal envelopes in wireless networks. Proceedings of the 14th ACM Conference on Computer And Communications Security, Alexandria, VA, USA.","DOI":"10.1145\/1315245.1315295"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2591","DOI":"10.1016\/j.comnet.2010.04.010","article-title":"A survey on key management mechanisms for distributed wireless sensor networks","volume":"54","author":"Simplicio","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.jnca.2009.10.001","article-title":"Wireless sensor network key management survey and taxonomy","volume":"33","author":"Zhang","year":"2010","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.adhoc.2015.01.006","article-title":"Survey on secure communication protocols for the Internet of Things","volume":"32","author":"Nguyen","year":"2015","journal-title":"Ad Hoc Netw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.comnet.2016.05.005","article-title":"A survey of key management schemes in multi-phase wireless sensor networks","volume":"105","author":"Messai","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1145\/1218556.1218559","article-title":"LEAP+: Efficient security mechanisms for large-scale distributed sensor networks","volume":"2","author":"Zhu","year":"2006","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"ref_16","unstructured":"Lai, B., Kim, S., and Verbauwhede, I. (, January December). Scalable session key construction protocol for wireless sensor networks. Proceedings of the IEEE Workshop on Large Scale Real Time and Embedded Systems (LARTES), Washington, DC, USA."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","article-title":"SPINS: Security protocols for sensor networks","volume":"8","author":"Perrig","year":"2002","journal-title":"Wirel. Netw."},{"key":"ref_18","unstructured":"Chan, H., and Perrig, A. (2005, January 13\u201317). PIKE: Peer intermediaries for key establishment in sensor networks. Proceedings of the IEEE INFOCOM. INSTITUTE OF ELECTRICAL ENGINEERS INC (IEEE), Miami, FL, USA."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., and Gligor, V.D. (2002, January 18\u201322). A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA.","DOI":"10.1145\/586110.586117"},{"key":"ref_20","unstructured":"Chan, H., Perrig, A., and Song, D. (2003, January 11\u201314). Random key predistribution schemes for sensor networks. Proceedings of the 2003 Symposium on Security and Privacy, Berkeley, CA, USA."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Svenda, P., and Matyas, V. (2007, January 8\u201311). Authenticated key exchange with group support for wireless sensor networks. Proceedings of the 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, Pisa, Italy.","DOI":"10.1109\/MOBHOC.2007.4428767"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"4797","DOI":"10.1002\/mma.3802","article-title":"Distributed key agreement for group communications based on elliptic curves. An application to sensor networks","volume":"39","author":"Lodroman","year":"2016","journal-title":"Math. Methods Appl. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Parrilla, L., Castillo, E., L\u00f3pez-Ramos, J.A., \u00c1lvarez Bermejo, J.A., Garc\u00eda, A., and Morales, D.P. (2018). Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks. Sensors, 18.","DOI":"10.3390\/s18010251"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"O\u0161\u0165\u00e1dal, R., \u0160venda, P., and Maty\u00e1\u0161, V. (2016, January 14\u201316). Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping\u2013Secrecy Amplification Case. Proceedings of the International Conference on Cryptology and Network Security, Milan, Italy.","DOI":"10.1007\/978-3-319-48965-0_34"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/4\/914\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:33:55Z","timestamp":1760186035000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/4\/914"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,21]]},"references-count":24,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2019,2]]}},"alternative-id":["s19040914"],"URL":"https:\/\/doi.org\/10.3390\/s19040914","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2019,2,21]]}}}