{"title":"节点捕获攻击下无线传感器网络密钥更新模型","authors":"Alekha Kumar Mishra, A. K. Turuk","doi":"10.1109/ICETET.2011.18","DOIUrl":null,"url":null,"abstract":"Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals mostly all key informations from a captured node. Therefore, the impact of node capture attack can be lessened by renew the keys through a authenticated channel in a periodic or reactive manner. Existing key renewal techniques are mostly based on the statistic or behavior of attacks. In this paper we proposed a key renewal model in wireless sensor networks using age replacement policy. We use this model to find the expected time interval between two successive key renewals to mitigate the impact of node capture attack on the network. We have also deduced the relationship between expected time interval between successive key renewals and the strength of the attacker.","PeriodicalId":443239,"journal":{"name":"2011 Fourth International Conference on Emerging Trends in Engineering & Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Key Renewal Model for Wireless Sensor Network Under Node Capture Attack\",\"authors\":\"Alekha Kumar Mishra, A. K. Turuk\",\"doi\":\"10.1109/ICETET.2011.18\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals mostly all key informations from a captured node. Therefore, the impact of node capture attack can be lessened by renew the keys through a authenticated channel in a periodic or reactive manner. Existing key renewal techniques are mostly based on the statistic or behavior of attacks. In this paper we proposed a key renewal model in wireless sensor networks using age replacement policy. We use this model to find the expected time interval between two successive key renewals to mitigate the impact of node capture attack on the network. We have also deduced the relationship between expected time interval between successive key renewals and the strength of the attacker.\",\"PeriodicalId\":443239,\"journal\":{\"name\":\"2011 Fourth International Conference on Emerging Trends in Engineering & Technology\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-11-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Fourth International Conference on Emerging Trends in Engineering & Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETET.2011.18\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Fourth International Conference on Emerging Trends in Engineering & Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETET.2011.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Key Renewal Model for Wireless Sensor Network Under Node Capture Attack
Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals mostly all key informations from a captured node. Therefore, the impact of node capture attack can be lessened by renew the keys through a authenticated channel in a periodic or reactive manner. Existing key renewal techniques are mostly based on the statistic or behavior of attacks. In this paper we proposed a key renewal model in wireless sensor networks using age replacement policy. We use this model to find the expected time interval between two successive key renewals to mitigate the impact of node capture attack on the network. We have also deduced the relationship between expected time interval between successive key renewals and the strength of the attacker.