Browse > Article

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA  

Park, Dong-Gook (Department of Information Technology, SunChon National University)
Abstract
Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.
Keywords
wireless sensor network; forward and backward secrecy; key management; process control systems; supervisory control and data acquisition;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Beaver, D. Gallup, W. Neumann, and M. Torgerson, "Key Management for SCADA", Technical Report SAND2001-3252, Sandia National Laboratories - Cryptography and Information Systems Surety Department, March 2002
2 M. Klonowski and M. Kutylowski and M. Ren and K. Rybarezyk, "Forward-Seeure Key Evolution in Wireless Sensor Networks", CANS, Springer-Verlag (LNCS 4856), 2007, pp. 102-120   DOI   ScienceOn
3 R. McClanahan, "SCADA and IP: Is Network Convergence Really Here?", Industry Applications Magazine, IEEE, 2003, pp.29-36   DOI   ScienceOn
4 M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographie Approach to Privacy-Friendly Tags", RFlD Privacy Workshop, 2003
5 R. Roman and C. Alcaraz and J. Lopez, "The Role of Wireless Sensor Networks in the Area of Critical Information Infrastructure Protection", Information Security Technical Report, Vol.12, Issue 1, 2007, pp.24-31   DOI   ScienceOn
6 D. Park, "A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks", This paper will appear in Journal of The Korea Society of Digital Industry & Information Management, 2009
7 S. Mauw, I van Vessem, and B. Bos, "Forward Secure Communication in Wireless Sensor Networks", Third International Conference Security in Pervasive Computing (SPC'06), Springer-Verlag (LNCS 3934), 2006, pp.32-42   DOI   ScienceOn
8 C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Counterneasures", First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 293-315
9 L. Lamport, "Password authentication with insecure communication", Communications of the ACM, 24( 11), 1981, pp.770-772   DOI   ScienceOn
10 M. Ren, K.D. Tanmoy and J. Zhou, "Diverging Keys in Wireless Sensor Networks", Information Security, Springer-Verlag (LNCS 4176), 2006, pp. 257-269   DOI   ScienceOn
11 L. Pietre-Cambacedes and P. Sitbon, "Cryptographic Key Management for SCADA Systems-Issues and Perspectives", International Journal of SecuriJy and its Applications, Vol 2, No.3, 2008, pp. 31-40
12 P. Szczechowiak, L.B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: Testing the limits of elliptic curve cryptography in sensor networks", European conference on Wireless Sensor Networks (EWSN'08), Springer-Verlag (LNCS 4913), 2008, ppJ05-320   DOI   ScienceOn
13 C. Gunther, "An Identity-Based Key-Exchange Protocol", Advances in Cryptology - Eurocrypt'89, Springer-Verlag (LNCS 434),1990, pp.29-37   DOI
14 D.K. Nilsson, T. Roosta, U. Lindqvist and A. Valdes, "Key Management and Secure Software Updates in Wireless Process Control Environments", Proceedings of the first ACM conference on Wireless network security (WiSec '08), March 31-April 2, 2008, Alexandria, VA, pp.100-108   DOI
15 R. Dawson and C. Boyd and E. Dawson and J.G. Nieto, "SKMA: a Key Management Architecture for SCADA Systems", ACSW Frontiers 2006, pp.183-192
16 J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey", Chapter 17 in Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, 2006
17 C. Hartung and J. Balasalle and R. Han, "Node Compromise in Sensor Networks: The Need f()r Secure Systems", Technical Report CU-CS-990-05, Department of Computer Scienee, University of Colorado at Boulder, January 2005
18 MAM. Vieiral, C.N. Coelho Jr, D.C. da Silva Jr., and J.M. da Mata, "Survey on wireless sensor network devices", Proceedings of IEEE Conference on Emerging Technologies and Factory Automation (EFTA03), 2003, pp.537-544   DOI