Browse > Article
http://dx.doi.org/10.6109/jicce.2010.8.5.549

Practical Attacks on Hybrid Group Key Management for SOHAN  

Liew, Jiun-Hau (Graduate School Design and IT of Dongseo University)
Ong, Ivy (Graduate School of Design and IT in Dongseo University)
Lee, Sang-Gon (Division of Computer & Information Engineering, Dongseo University)
Lim, Hyo-Taek (Division of Computer and Information Engineering)
Lee, Hoon-Jae (School of Computer and Information Engineering at Dongseo University.)
Abstract
Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed by the scheme. The first attack enables a long-term but slow data fabrication while other attack causes more severe DoS on the access to cluster sensor nodes.
Keywords
Data Fabrication; Denial of Service; Hybrid Group Key Management; Wireless Sensor Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S.Y. Lim, M.H. Lim, S.G. Lee, and H.J. Lee, "Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network," Proc. of the Fourth International Conference on Information Assurance and Security, 2008, pp. 43-49.
2 C. Su, K. Chang, Y. Kuo, and M. Horng, "The New Intrusion Prevention and Detection Approaches for Clustering-Based Sensor Networks," IEEE Wireless Communications and Networking Conference, vol. 4, 2005, pp. 1927-1932.
3 S. Ganu, L. Raju, B. Anepu, I. Seskar, and D. Raychaudhuri, "Architecture and Prototyping of an 802.11-based Self-Organizing Hierarchical Ad-Hoc Wireless Network (SOHAN)," Proc. of the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 2, 2004, pp. 880-884.
4 T. Park and K.G. Shin, "LiSP: A Lightweight Security Protocol for Wireless Sensor Networks," ACM Transactions on Embedded Computing Systems, vol. 3, no. 3, 2004, pp. 634-660.   DOI
5 J. Ibriq and I. Mahgoub, "Cluster-Based Routing in Wireless Sensor Networks: Issues and Challenges," Proc. of the 2004 Sym. on Performance Evaluation of Computer Telecommunication Systems, 2004, pp. 759-766.
6 M. Burmerster and Y. Desmedt, "A Secure and Scalable Group Key Exchange System," Information Processing Letter, vol. 94, no. 3, 2005, pp. 137-143.   DOI   ScienceOn
7 D. Carman, B. Matt, and G. Cirincione, "Energy-efficient and Low-latency Key Management for Sensor Networks," Proc. of 23rd Army Science Conference, 2002.
8 S. Zhu, S. Setia, S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed MSN Networks," Proc. of ACM conference on Computer and Communication Security, 2003, pp. 62-72.