Browse > Article
http://dx.doi.org/10.5392/JKCA.2010.10.7.070

Resilient Security Protocol for Combating Replay Attacks in Wireless Sensor Networks  

Zhang, Di (전북대학교 전자공학부 영상정보신기술연구센터)
Heo, Ung (전북대학교 전자공학부 영상정보신기술연구센터)
You, Kang-Soo (전주대학교 교양학부)
Choi, Jae-Ho (전북대학교 전자공학부 영상정보신기술연구센터)
Publication Information
Abstract
Due to the resource limitations of sensor nodes, providing a security protocol is a particular challenge in sensor networks. One popular method is the neighborhood-based key agreement protocol (NEKAP). NEKAP is an efficient and lightweight protocol, but it includes loopholes through which adversaries may launch replay attacks by successfully masquerading as legitimate nodes. In this paper, we present a modified security protocol for wireless sensor networks. We provide four types of keys for each node, which adapt to different security requirements; and an improvement is made to alleviate the replay attack. According to our qualitative performance analyses, the proposed security protocol provides effectiveness in terms of authentication security, attacking node detection, and replay attack resilience when compared to the conventional method.
Keywords
Wireless Sensor Networks; Authentication; Replay Attack; Security Protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Eschenauer and V. D. Glicor, "A key-management scheme for distributed sensor network," Proc. of 9th ACM conference (CCS '02), pp.41-47, Washington, D.C., USA, 2002.   DOI
2 H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," 2003 IEEE Symposium on Security and Privacy, Berkeley, pp.197-215, CA, 2003.
3 D. Liu, P. Ning and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks," ACM Transactions on Information and System Security, Vol.8, No.1, pp.41-77, 2005(2).   DOI
4 S. Zhu, S. Setia and S. Jajodia, "LEAP: efficient security mechanisms for large-scale distributed sensor networks," 10th ACM Conference (CCS '03), pp.62-72, Washington D.C., USA, 2003(10).
5 A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," in Wireless Networks, pp.521-534, Kluwer Academic Publishers, Netherlands, 2002.
6 Http://www.xbow.com/Support/Support_pdf_files/getting_started_guide.pdf
7 Y. Zhou and Y. Fang, "Scalable Link-Layer Key Agreement in Sensor Networks," Proc. of MILCOM '06, pp.1-6, Washington, D.C., USA, 2006.   DOI
8 S. De Oliveira, H. C. Wong and J. M. Nogueira, "NEKAP: Intruder Resilient and Energy Efficient Key Establishment in Sensor Networks," Proc. of ICCCN'07, pp.803-808, Honolulu, Hawaii, USA, 2007.   DOI
9 M. Vella and A. Mahdy, "Survey of wireless sensor network security," Proc. of SACNAS '08, pp.128-134, Salt Lake, Utah, USA, 2008.
10 D. Raymond and S. Midkiff, "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, Vol.7, No.1, pp.74-81, 2008.   DOI   ScienceOn