{"title":"基于随机密钥分配的无线传感器网络弹性无缝密钥更新方案","authors":"Priyanka Ahlawat, M. Dave","doi":"10.1109/COMPTELIX.2017.8003987","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked from the network by means of rekeying. We aim to optimize the problem of key revocation and rekeying by reducing the communication and computation overhead. An attack algorithm is presented from an adversarial view point, compromising of capturing cost and traveling cost. It is used to compute the destructive rank of each node which ultimately finds the set of vulnerable nodes of the network. Each communicating node determine a backup key for future node revocation and automatically switches to it, to avoid the reconfiguration of the shared key. The keys of vulnerable nodes are bypassed during the generation of the backup link keys. It is shown that proposed scheme has high level of security as well as reduced communication overhead during rekeying process. The proposed attack is also compared with random attack and found that it is improved in terms of route compromise ratio and energy cost.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"35 1","pages":"321-327"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A resilient and seamless rekeying scheme based on random key distribution for WSN\",\"authors\":\"Priyanka Ahlawat, M. Dave\",\"doi\":\"10.1109/COMPTELIX.2017.8003987\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked from the network by means of rekeying. We aim to optimize the problem of key revocation and rekeying by reducing the communication and computation overhead. An attack algorithm is presented from an adversarial view point, compromising of capturing cost and traveling cost. It is used to compute the destructive rank of each node which ultimately finds the set of vulnerable nodes of the network. Each communicating node determine a backup key for future node revocation and automatically switches to it, to avoid the reconfiguration of the shared key. The keys of vulnerable nodes are bypassed during the generation of the backup link keys. It is shown that proposed scheme has high level of security as well as reduced communication overhead during rekeying process. The proposed attack is also compared with random attack and found that it is improved in terms of route compromise ratio and energy cost.\",\"PeriodicalId\":6917,\"journal\":{\"name\":\"2017 International Conference on Computer, Communications and Electronics (Comptelix)\",\"volume\":\"35 1\",\"pages\":\"321-327\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Computer, Communications and Electronics (Comptelix)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPTELIX.2017.8003987\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPTELIX.2017.8003987","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A resilient and seamless rekeying scheme based on random key distribution for WSN
Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked from the network by means of rekeying. We aim to optimize the problem of key revocation and rekeying by reducing the communication and computation overhead. An attack algorithm is presented from an adversarial view point, compromising of capturing cost and traveling cost. It is used to compute the destructive rank of each node which ultimately finds the set of vulnerable nodes of the network. Each communicating node determine a backup key for future node revocation and automatically switches to it, to avoid the reconfiguration of the shared key. The keys of vulnerable nodes are bypassed during the generation of the backup link keys. It is shown that proposed scheme has high level of security as well as reduced communication overhead during rekeying process. The proposed attack is also compared with random attack and found that it is improved in terms of route compromise ratio and energy cost.