基于随机密钥分配的无线传感器网络弹性无缝密钥更新方案

Priyanka Ahlawat, M. Dave
{"title":"基于随机密钥分配的无线传感器网络弹性无缝密钥更新方案","authors":"Priyanka Ahlawat, M. Dave","doi":"10.1109/COMPTELIX.2017.8003987","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked from the network by means of rekeying. We aim to optimize the problem of key revocation and rekeying by reducing the communication and computation overhead. An attack algorithm is presented from an adversarial view point, compromising of capturing cost and traveling cost. It is used to compute the destructive rank of each node which ultimately finds the set of vulnerable nodes of the network. Each communicating node determine a backup key for future node revocation and automatically switches to it, to avoid the reconfiguration of the shared key. The keys of vulnerable nodes are bypassed during the generation of the backup link keys. It is shown that proposed scheme has high level of security as well as reduced communication overhead during rekeying process. The proposed attack is also compared with random attack and found that it is improved in terms of route compromise ratio and energy cost.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"35 1","pages":"321-327"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A resilient and seamless rekeying scheme based on random key distribution for WSN\",\"authors\":\"Priyanka Ahlawat, M. Dave\",\"doi\":\"10.1109/COMPTELIX.2017.8003987\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked from the network by means of rekeying. We aim to optimize the problem of key revocation and rekeying by reducing the communication and computation overhead. An attack algorithm is presented from an adversarial view point, compromising of capturing cost and traveling cost. It is used to compute the destructive rank of each node which ultimately finds the set of vulnerable nodes of the network. Each communicating node determine a backup key for future node revocation and automatically switches to it, to avoid the reconfiguration of the shared key. The keys of vulnerable nodes are bypassed during the generation of the backup link keys. It is shown that proposed scheme has high level of security as well as reduced communication overhead during rekeying process. The proposed attack is also compared with random attack and found that it is improved in terms of route compromise ratio and energy cost.\",\"PeriodicalId\":6917,\"journal\":{\"name\":\"2017 International Conference on Computer, Communications and Electronics (Comptelix)\",\"volume\":\"35 1\",\"pages\":\"321-327\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Computer, Communications and Electronics (Comptelix)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPTELIX.2017.8003987\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPTELIX.2017.8003987","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

无线传感器网络经常被放置在敌对和无人值守的区域,使节点暴露在许多攻击中。节点捕获是此类网络中最主要的攻击之一。无论何时捕获一个节点,都必须通过重设密钥的方式从网络中撤销其密钥。我们的目标是通过减少通信和计算开销来优化密钥撤销和密钥更新问题。从对抗的角度提出了一种攻击算法,折衷了捕获代价和移动代价。它用于计算每个节点的破坏秩,最终找到网络中脆弱节点的集合。每个通信节点为将来的节点撤销确定一个备份密钥,并自动切换到它,以避免重新配置共享密钥。在生成备份链路密钥时,绕过脆弱节点的密钥。结果表明,该方案具有较高的安全性和较低的密钥重置过程通信开销。并与随机攻击进行了比较,发现该方法在路由妥协率和能量消耗方面都有改进。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A resilient and seamless rekeying scheme based on random key distribution for WSN
Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked from the network by means of rekeying. We aim to optimize the problem of key revocation and rekeying by reducing the communication and computation overhead. An attack algorithm is presented from an adversarial view point, compromising of capturing cost and traveling cost. It is used to compute the destructive rank of each node which ultimately finds the set of vulnerable nodes of the network. Each communicating node determine a backup key for future node revocation and automatically switches to it, to avoid the reconfiguration of the shared key. The keys of vulnerable nodes are bypassed during the generation of the backup link keys. It is shown that proposed scheme has high level of security as well as reduced communication overhead during rekeying process. The proposed attack is also compared with random attack and found that it is improved in terms of route compromise ratio and energy cost.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Classification of mental tasks using S-transform based fractal features Gauge Theory and spontaneous breaking of symmetry in superconductors Stable type-2 fuzzy logic control of TCSC to improve damping of power systems An analysis on broadband SHG using TIR-QPM in a multi-tapered slab of ZnSe in mid-IR region Analytical study of SINR for OFDMA Uplink in presence of Transceiver Phase Noise
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1