Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4,229 Hits in 4.7 sec

On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks

Jun Zhao
2017 IEEE Transactions on Information Forensics and Security  
Despite much research on probabilistic key predistribution schemes for wireless sensor networks over the past decade, few formal analyses exist that define schemes' resilience to node-capture attacks precisely  ...  Moreover, we derive the critical network parameters to ensure connectivity in both the absence and presence of node-capture attacks.  ...  Design guideline for connectivity in the presence/absence of node capture: In an n-size secure wireless sensor network employing the q-composite scheme with key ring size K n and key pool size P n and  ... 
doi:10.1109/tifs.2016.2613841 fatcat:ilnnhonvube65jumgnq3uatqde

An Exhaustive Survey on Physical Node Capture Attack in WSN

Bhavana Butani, Piyush Kumar Shukla, Sanjay Silakari
2014 International Journal of Computer Applications  
Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals cryptographic key information from a captured node to compromise entire network.  ...  So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links.  ...  The estimation of optimal revocation rates gain secured network connectivity under attack. Thus provides resilience against node capture attack.  ... 
doi:10.5120/16577-6265 fatcat:umstipzwtzcfpdwqj4myexq2fe

Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

Bhavana Butani, Piyush Kumar Shukla, Sanjay Silakari
2014 International Journal of Computer Network and Information Security  
Node capture attack is one of the most dreadful security attack exist in wireless sensor networks.  ...  It also analyzes various detection and key predistribution schemes for inventing a new scheme to improve resilience against node capture attack. range of more than one static node and this result strongly  ...  The estimation of optimal revocation rates gain secured network connectivity under attack. Thus provides resilience against node capture attack.  ... 
doi:10.5815/ijcnis.2014.11.04 fatcat:qwl6acebejdoxnxht2hrcjzxiu

A resilient key predistribution scheme for multiphase wireless sensor networks

Murat Ergun, Albert Levi, Erkay Savas
2009 2009 24th International Symposium on Computer and Information Sciences  
In this paper, we propose a key predistribution scheme for multi-phase wireless sensor networks which is highly resilient under node capture attacks.  ...  However, these schemes are designed for single phase networks which are not resilient against continuous node capture attacks; even under temporary attacks on the network, the harm caused by the attacker  ...  Figure 1 . 1 Active 1-resiliency of RoK and RGM in case of an eager attacker with capture rates of 1, 3, and 5 nodes per round Figures 1 and 2 show 1-resiliency of the sensor network against an eager attacker  ... 
doi:10.1109/iscis.2009.5291809 dblp:conf/iscis/ErgunLS09 fatcat:moxpvfu5tvdzjlfmx5j33xk4ly

Scalable and Storage Efficient Dynamic Key Management Scheme for Wireless Sensor Network

Vipin Kumar, Navneet Malik, Gaurav Dhiman, Tarun Kumar Lohani
2021 Wireless Communications and Mobile Computing  
We analysed the resiliency of the scheme (that is the probability of key compromise against the node capture) and compared it with other existing schemes.  ...  In wireless sensor network, it is very difficult to manage the keys as this includes distribution of key, generation of new session key as per requirements, and renewal or revoke the keys in case of attacks  ...  Security of Wireless Sensor Network There is no continuous energy source which powers the sensor nodes.  ... 
doi:10.1155/2021/5512879 doaj:22e7b4fa257a42ae8e3a7a584b80c0d9 fatcat:xy4vo6chkbb3jgivovgtnnq5pq

Storage-Optimal Key Sharing with Authentication in Sensor Networks [chapter]

Jian Wang, Z. Y. Xia, Lein Harn, Guihai Chen
2005 Lecture Notes in Computer Science  
For example, an adversary can easily listen to the traffic, impersonate one of the network nodes, or intentionally inject misleading information to other nodes, and even severe, make DoS attacks, e.g.  ...  In typical application scenarios, sensor nodes are spread randomly over the terrain under scrutiny so as to collect sensing data. Examples of sensor network projects include SmartDust [1] and WINS.  ...  Security is an important issue for wireless sensor networks.  ... 
doi:10.1007/11576259_51 fatcat:myqiccwdgncf3nvpgoeysfrh2m

Storage-optimal key sharing with authentication in sensor networks

Jian Wang, Zyxia, L. Harn
2005 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems  
For example, an adversary can easily listen to the traffic, impersonate one of the network nodes, or intentionally inject misleading information to other nodes, and even severe, make DoS attacks, e.g.  ...  In typical application scenarios, sensor nodes are spread randomly over the terrain under scrutiny so as to collect sensing data. Examples of sensor network projects include SmartDust [1] and WINS.  ...  Security is an important issue for wireless sensor networks.  ... 
doi:10.1109/mtas.2005.243759 fatcat:dz7l2johsfeqpl53axiax5w5aq

On Attack-Resilient Wireless Sensor Networks with Novel Recovery Strategies

Ka-Shun Hung, Chun-Fai Law, King-Shan Lui, Yu-Kwong Kwok
2009 2009 IEEE Wireless Communications and Networking Conference  
In a wireless sensor network (WSN), when an adversary physically captures one or more sensor nodes, all the information stored on these nodes may be exposed completely.  ...  In this paper, we investigate the effects of different node capture attack patterns on state-ofthe-art key management schemes.  ...  By bounding the regions of a node capture attack, we propose to carry out node replenishment in the severely attacked region to restore the secure connectivity of the regions to other parts of the network  ... 
doi:10.1109/wcnc.2009.4917842 dblp:conf/wcnc/HungLLK09 fatcat:4dobbfmmyzhavkswrkvmjxseqa

Using combined keying materials for key distribution in wireless sensor networks

Murat Ergun, Albert Levi
2010 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications  
In this paper, we propose a probabilistic key predistribution scheme for wireless sensor networks that increases connectivity of the basic scheme while keeping sizes of keyring and key pool fixed.  ...  We aim to control the resilience of the network against node capture attacks by using XORed keys since an attacker has to know either both single key operands or the XORed key itself.  ...  In a node capture attack, the attacker captures nodes at random locations of the network.  ... 
doi:10.1109/pimrc.2010.5671778 dblp:conf/pimrc/ErgunL10 fatcat:pv57uvl3lzaufmqetmsklrnh7u

An Improved Overlap-Key-Sharing Key Management Scheme for Wireless Sensor Networks

Lan Ying Li, Chun Huan Yi, Jian Da Sun, Tie Qiang Si
2013 International Journal of Security and Its Applications  
However, most of the existing key pre-distribution schemes of wireless sensor network have the problems of low connectivity rate , large storage consumption or poor resilience against node capture .On  ...  This scheme has a fatal flaw, that is if one node is captured, the security of the entire wireless sensor network will be compromised.  ...  Acknowledgements Supported by Scientific Research Fund of Heilongjiang Provincial Education Department (NO:12531107).  ... 
doi:10.14257/ijsia.2013.7.5.35 fatcat:gc23zup5zvcdtbqqprdcceyh2u

Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks [chapter]

Onur Catakoglu, Albert Levi
2013 Lecture Notes in Electrical Engineering  
In multi-phase Wireless Sensor Networks (WSNs), sensor nodes are redeployed periodically to replace nodes whose batteries are depleted.  ...  In order to keep the network resilient against node capture attacks across different deployment epochs, called generations, it is necessary to refresh the key pools from which cryptographic keys are distributed  ...  For the evaluation of the network resiliency, we consider an attacker who captures sensor nodes with rates 1, 3 and 5 nodes per round (1 generation = 10 rounds).  ... 
doi:10.1007/978-3-319-01604-7_35 fatcat:qdqtbd526ng7nhidxf3jndgjki

Impersonating-Resilient Dynamic Key Management for Large-Scale Wireless Sensor Networks

Gowun Jeong, Yong-Ho Seo, Hyun S. Yang
2013 International Journal of Distributed Sensor Networks  
Key management in a large portion of ubiquitous sensor networks has been a challenge due to the limited capabilities of their wireless communicating and battery-powered sensors.  ...  Moreover, an attacker physically capturing even a few nodes hampers the entire network security by impersonating nodes to inject false data in an undetected manner.  ...  Introduction Wireless sensor networks (WSNs) of wireless communicating and battery-powered sensors have attracted attention from ubiquitous networking due to such sensors' cheapness and handy installation  ... 
doi:10.1155/2013/397926 fatcat:2dj7r7fxwjdnpimj4rkbedsjba

Securing wireless sensor networks against large-scale node capture attacks

Tuan Manh Vu, Reihaneh Safavi-Naini, Carey Williamson
2010 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS '10  
Securing wireless sensor networks against node capture is a challenging task.  ...  material while maintaining secure connectivity of the network.  ...  Acknowledgments Financial support for this research was provided by iCORE (Informatics Circle of Research Excellence) in the Province of Alberta, as well as NSERC (Natural Sciences and Engineering Research  ... 
doi:10.1145/1755688.1755703 dblp:conf/ccs/VuSW10 fatcat:nwueucz7nfbybiuym63ogt4uyy

A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks

Kubra Kalkan, Sinem Yilmaz, Omer Zekvan Yilmaz, Albert Levi
2009 Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks - Q2SWinet '09  
Pairwise key distribution among the sensor nodes is an essential problem for providing security in Wireless Sensor Networks (WSNs).  ...  Moreover, our scheme ensures almost 100% secure connectivity, which means a sensor node shares at least one key with almost all of its neighbors.  ...  Next, we analyze the resiliency of the network under node capture attacks. Here two different metrics are used.  ... 
doi:10.1145/1641944.1641951 dblp:conf/mswim/KalkanYYL09 fatcat:l576ewji75gpxm5npoqeyodzle

A Novel Key Redistribution Scheme for Wireless Sensor Networks

C.-F. Law, K.-S. Hung, Y.-K. Kwok
2007 2007 IEEE International Conference on Communications  
Key management has long been a challenging problem in wireless Distributed Sensor Networks (DSNs) due to their high security requirements and strict resource constraints.  ...  These schemes mainly focus on key allocations based on pre-deployment estimates of post-deployment information items, such as location data and attack probabilities.  ...  Network resilience against node capture attack From Figure 6 , we note that the network resilience of our key redistribution scheme is better than that of the basic scheme and approaching that of the  ... 
doi:10.1109/icc.2007.569 dblp:conf/icc/LawHK07 fatcat:bm7njxachffirdstzywohuvvhm
« Previous Showing results 1 — 15 out of 4,229 results