Algorithm for Misused Pairwise Keys Detection in Wireless Sensor Networks
Author:
  • Article
  • | |
  • Metrics
  • |
  • Reference [18]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    In wireless sensor networks, the pairwise keys shared by non-compromised nodes could be compromised, then the adversary would misuse the pairwise keys to forge message report in order to destroy secure communication or deplete the limited resource in sensor nodes. To address this issue, in this paper, an algorithm is proposed to detect misused pairwise keys. Specially, an efficient verifiable authenticator is attached to each message report. The forwarding node can detect whether the pairwise key is misused by verifying the authenticator. The security analysis and performance analysis demonstrate the efficiency of the proposed algorithm. Moreover, the proposed algorithm can be integrated with most of key pre-distribution schemes or false data filtering schemes to provide more reliable secure communication.

    Reference
    1 Chaddoud G. A selective survey on key distribution in sensor networks. Damascus University Journal, 2012, 28(1):105-123
    2 Liu D, Dong Q. Detecting misused keys in wireless sensor networks. International Performance Computing and Communications Conference. April 2007. 272-280.
    3 Kim M, Han YJ, Park SH, Chung TM. An enhanced misused key detection mechanism in wireless sensor networks. Second International Conference on Sensor Technologies and Applications(SENSORCOMM). 2008. 645-650.
    4 Park MW, Kim JM, Han YJ, Chung TM. A misused key detection mechanism for hierarchical routings in wireless sensor network. 4th International Conference on Networked Computing and Advanced Information Management(NCM).2008. 47-52.
    5 Kang DM, Park MW, Han YJ, Park SH. A misused key detection mechanism using the token in Wireless Sensor Networks. The 12th International Conference on Advanced Communication Technology (ICACT). 2010. 238-242.
    6 Han YJ, Park MW, Kim JM, Chung TM. A light-weighted misused key detection in wireless sensor networks. Computational Science and Its Applications-ICCSA 2010, Lecture Notes in Computer Science Volume 6018, 2010:352-367.
    7 Goyal R, Prasad D. An efficient security scheme for wireless sensor networks. International Journal of Emerging Technology and Advanced Engineering, 2013, 3(4): 793-796.
    8 Broder A, Mitzenmacher M. Network applications of bloom filters: A survey. Internet Mathematics, 2004, 1(4): 485-509.
    9 Malan DJ, Welsh M, Smith MD. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. 1st IEEE Int' Conf. on Sensor and Ad Hoc Communications and Networks. IEEE Press. 2004. 71-80.
    10 Roman R, Alcaraz C, Lopez J. A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes. Mobile, Networks and Applications (MONET) Journal, Springer, 2007, 12(4): 231-244.
    11 ANSI X9.63. Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport using Elliptic Curve Cryptography. Washington, American National Standards Institute. 1998.
    12 Hartung C, Balasalle J, Han R. Node compromise in sensor networks: The need for secure systems. University of Colorado Technical Report. CU-CS-990-05. December2004.
    13 Hwang J, He T, Kim Y. Detecting phantom nodes in wireless sensor networks. the 26th IEEE International Conf. on Computer Comm. (INFOCOM). 2007. 2391-2395.
    14 Staddon J, Balfanz D, Durfee G. Efficient tracing of failed nodes in sensor networks. The 1st ACM International Workshop on Wireless Sensor Networks and Applications.2002. 122-130.
    15 Dong D, Liu Y, Liao X, Self-monitoring for sensor networks. the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). 2008. 431-440.
    16 Rivest R. The RC5 encryption algorithm. The 1st International Workshop on Fast Software Encryption. volume 809, 1994. 86-96.
    17 Wander AS, Gura N, Eberle H, Gupta V, Shantz SC. Energy analysis of public-key cryptography for wireless sensor networks. 3rd IEEE International Conference on Pervasive Computing and Communications (PERCOM). 2005. 324-328.
    18 IEEE Computer Society. IEEE 802.15.4: IEEE standard for information technology-- telecommunications and information exchange between systems local and metropolitan area networks.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

苏忠,徐洸,丛培荣.无线传感器网络对偶密钥误用检测算法.计算机系统应用,2014,23(9):94-101

Copy
Share
Article Metrics
  • Abstract:2245
  • PDF: 2707
  • HTML: 0
  • Cited by: 0
History
  • Received:December 31,2013
  • Revised:March 07,2014
  • Online: September 18,2014
Article QR Code
You are the first1095028Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063