DOI QR코드

DOI QR Code

On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks

  • 발행 : 2009.08.25

초록

In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.

키워드

참고문헌

  1. A. Wander, N. Gura, H. Eberle, V. Gupta, and S.C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," In PerCom, pp. 324-328, 2005.
  2. D.J. Malan, M. Welsh, and M.D. Smith, “A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography,” In First IEEE Int. Conf. on Sensor and Ad Hoc Comm. and Networks, pp. 71-80, 2004.
  3. N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz, “Comparing elliptic curve cryptography and rsa on 8-bit CPUs,” In CHES, pages 119-132, 2004.
  4. D. Nyang and A. Mohaisen, “Cooperative public key authentication protocol in wireless sensor network,” In UIC, pp. 864-873, 2006.
  5. A. Mohaisen, D. Nyang, Y. Maeng, and K. Lee, "Structures for communication efficient public key revocation in ubiquitous sensor network," In MSN, pp. 822-833. Springer, 2007.
  6. Md. M. Haque, A.-S.K. Pathan, C.S. Hong, and E. Huh, “An asymmetric key-based security architecture for wireless sensor networks,” TIIS, vol. 2, no. 5, pp. 265-279, 2008. https://doi.org/10.3837/tiis.2008.05.004
  7. D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” In ACM CCS, pp. 52-61, 2003.
  8. W. Du, J. Deng, Y.S. Han, P.K. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Trans. Inf. Syst. Secur., vol. 8, no.2, pp. 228-258, 2005. https://doi.org/10.1145/1065545.1065548
  9. A. Mohaisen, Y. Maeng, and D. Nyang, “On grid-based key pre-distribution: Toward a better connectivity in wireless sensor network,” In PAKDD Workshops, pp. 527-537, 2007.
  10. A. Mohaisen and D. Nyang, “Hierarchical grid-based pairwise key predistribution scheme for wireless sensor networks,” In EWSN, pp. 83-98, 2006.
  11. D. Liu, P. Ning, and R. Li, “Establishing pairwise keys in distributed sensor networks,” ACM Trans. Inf. Syst. Secur., vol. 8, no. 1, pp. 41-77, 2005. https://doi.org/10.1145/1053283.1053287
  12. T. Ito, H. Ohta, N. Matsuda, and T. Yoneda, “A key pre-distribution scheme for secure sensor networks using probability density function of node deployment,” In SASN, pp. 69-75. ACM, Oct. 2005.
  13. A. Mohaisen, D. Nyang, Y. Maeng, K. Lee, and D. Hong, “Grid-based key pre-distribution in wireless sensor networks,” TIIS, vol. 3, no. 2, pp. 195-208, 2009. https://doi.org/10.3837/tiis.2009.02.005
  14. A. Mohaisen, D. Nyang, and T. AbuHmed, “Two-level key pool design-based random key pre-distribution in wireless sensor networks,” TIIS, vol. 2, no. 5, pp. 222-238, 2008. https://doi.org/10.3837/tiis.2008.05.001
  15. L. Eschenauer and V.D. Gligor, "A key-management scheme for distributed sensor networks," In ACM CCS, pp. 41-47, 2002.
  16. S.R. Blackburn, T. Etzion, K.M. Martin, and M.B. Paterson, “Efficient key predistribution for grid-based wireless sensor networks,” In ICITS, vol. 5155 of LNCS, pp. 54-69, 2008.
  17. W. Di_e and M. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976. https://doi.org/10.1109/TIT.1976.1055638

피인용 문헌

  1. Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks vol.7, pp.1, 2013, https://doi.org/10.1109/jsyst.2012.2188689
  2. A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network vol.21, pp.2, 2016, https://doi.org/10.1007/s11036-016-0683-y
  3. Energy-aware and secure routing with trust for disaster response wireless sensor network vol.10, pp.1, 2017, https://doi.org/10.1007/s12083-015-0421-4
  4. An Energy Efficient Trust Aware Opportunistic Routing Protocol for Wireless Sensor Network : vol.8, pp.2, 2017, https://doi.org/10.4018/ijismd.2017040102