DOI QR코드

DOI QR Code

Practical Attacks on Hybrid Group Key Management for SOHAN

  • Liew, Jiun-Hau (Graduate School Design and IT of Dongseo University) ;
  • Ong, Ivy (Graduate School of Design and IT in Dongseo University) ;
  • Lee, Sang-Gon (Division of Computer & Information Engineering, Dongseo University) ;
  • Lim, Hyo-Taek (Division of Computer and Information Engineering) ;
  • Lee, Hoon-Jae (School of Computer and Information Engineering at Dongseo University.)
  • 투고 : 2010.07.19
  • 심사 : 2010.08.11
  • 발행 : 2010.10.30

초록

Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed by the scheme. The first attack enables a long-term but slow data fabrication while other attack causes more severe DoS on the access to cluster sensor nodes.

키워드

참고문헌

  1. J. Ibriq and I. Mahgoub, "Cluster-Based Routing in Wireless Sensor Networks: Issues and Challenges," Proc. of the 2004 Sym. on Performance Evaluation of Computer Telecommunication Systems, 2004, pp. 759-766.
  2. T. Park and K.G. Shin, "LiSP: A Lightweight Security Protocol for Wireless Sensor Networks," ACM Transactions on Embedded Computing Systems, vol. 3, no. 3, 2004, pp. 634-660. https://doi.org/10.1145/1015047.1015056
  3. M. Burmerster and Y. Desmedt, "A Secure and Scalable Group Key Exchange System," Information Processing Letter, vol. 94, no. 3, 2005, pp. 137-143. https://doi.org/10.1016/j.ipl.2005.01.003
  4. D. Carman, B. Matt, and G. Cirincione, "Energy-efficient and Low-latency Key Management for Sensor Networks," Proc. of 23rd Army Science Conference, 2002.
  5. S. Zhu, S. Setia, S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed MSN Networks," Proc. of ACM conference on Computer and Communication Security, 2003, pp. 62-72.
  6. S.Y. Lim, M.H. Lim, S.G. Lee, and H.J. Lee, "Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network," Proc. of the Fourth International Conference on Information Assurance and Security, 2008, pp. 43-49.
  7. C. Su, K. Chang, Y. Kuo, and M. Horng, "The New Intrusion Prevention and Detection Approaches for Clustering-Based Sensor Networks," IEEE Wireless Communications and Networking Conference, vol. 4, 2005, pp. 1927-1932.
  8. S. Ganu, L. Raju, B. Anepu, I. Seskar, and D. Raychaudhuri, "Architecture and Prototyping of an 802.11-based Self-Organizing Hierarchical Ad-Hoc Wireless Network (SOHAN)," Proc. of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 2, 2004, pp. 880-884.