@inproceedings{0ad5246125874ef19bbb82af95732ede,
title = "STUN: Secret-Free Trust-Establishment For Underground Wireless Networks",
abstract = "Emerging agricultural internet-of-things (Ag-IoT) is increasing the efficiency of farming. The data collected by the wireless-enabled Ag-IoT infrastructure is highly sensitive as corrupting the data can cause significant damages to farm production and the livelihood of growers. The trust of the data can be established by initial secure bootstrapping of the wireless underground end nodes. This paper tackles the problem of scalable and secret-free trust-establishment for commercial off-the-shelf (COTS) underground nodes with an aboveground gateway applicable to heterogeneous end nodes. Secure boot-strapping requires authentication and secret establishment, which are achieved in-band, aided by a trusted underground node by exploiting the unique and hard-to-forge underground wireless signal propagation laws. The secret-free trust-establishment for underground wireless networks (STUN) protocol is resistant to active signal injection attacks and is scalable with an increasing number of underground nodes. Further, it is theoretically proven that STUN has security equivalent to the unbalanced oil and vinegar scheme in public cryptography. STUN is validated based on experimental data from an underground wireless testbed.",
keywords = "Ag-IoT, authentication, message integrity, secret-free, secure bootstrapping, underground wireless",
author = "Ebuka Oguchi and Nirnimesh Ghose and Vuran, {Mehmet C.}",
note = "Funding Information: V. CONCLUSION We address the problem of a secret-free secure bootstrapping for COTS underground nodes with an aboveground gateway. We propose STUN, which can achieve node authentication and secret establishment in-band with the assistance of a trusted underground node by utilizing hard-to-forge underground wireless propagation laws. We theoretically prove that STUN has security equivalent to the UOV scheme in public cryptography. We also validate our theoretical results with experiments in an underground wireless testbed. In the future, we plan to experimentally evaluate and optimize the placements of the trusted nodes to cover an agricultural farm. Also, develop security for G-to-L communication link. ACKNOWLEDGMENTS We thank the anonymous reviewers for their insightful comments. This research was supported in part by the NSF under grants ECCS-2030272, CNS-1619285. Any opinions, findings, conclusions, or recommendations expressed in this paper are those of the author(s) and do not necessarily reflect the views of the NSF. Publisher Copyright: {\textcopyright} 2022 IEEE.; 2022 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2022 ; Conference date: 02-05-2022 Through 05-05-2022",
year = "2022",
doi = "10.1109/INFOCOMWKSHPS54753.2022.9798227",
language = "English (US)",
series = "INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "INFOCOM WKSHPS 2022 - IEEE Conference on Computer Communications Workshops",
}