Mitigating eavesdropping attack using secure key management scheme in wireless mesh networks

被引:5
|
作者
Kandah, Farah [1 ]
Singh, Yashaswi [1 ]
Zhang, Weiyi [2 ]
机构
[1] Department of Computer Science, North Dakota State University, Fargo, ND 58105, United States
[2] AT and T Labs - Research, Middletown, NJ 07748, United States
来源
Journal of Communications | 2012年 / 7卷 / SPL.ISS. 8期
关键词
Network security - Wireless mesh networks (WMN) - MESH networking - Public key cryptography - Security systems;
D O I
10.4304/jcm.7.8.596-605
中图分类号
学科分类号
摘要
Wireless mesh network (WMN) is a rapid deployed, self organized and multi-hop wireless networks. However, the wireless and distributed natures of WMN make it subject to various kinds of malicious attacks, which raise a great challenge in securing these networks. Most existing security mechanisms are based on cryptographic keys where a high degree key management services are in demand. In this paper, we present an effective secure key management scheme (SKeMS) which seeks an encryption key assignment such that the induced network is securely key connected and well protected against potential malicious eavesdropping attacks. Compared to previous work, our scheme assigns the available encryption keys among all the nodes in the network. Our simulation results show that our scheme outperforms previous schemes through providing a network that is resistant to malicious eavesdropping attack. © 2012 ACADEMY PUBLISHER.
引用
收藏
页码:596 / 605
相关论文
共 50 条
  • [41] An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks
    Das, Ashok Kumar
    2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS 2009), 2009, : 653 - 662
  • [42] An approach to mitigating Sybil attack in wireless networks using ZigBee
    Lee, Gunhee
    Lim, Jaesung
    Kim, Dong-Kyoo
    Yang, SungHyun
    Yoon, MyungHyun
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1005 - +
  • [43] A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques
    Chen, Lei
    Wei, Fushan
    Ma, Chuangui
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [44] On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC
    Sutrala, Anil Kumar
    Das, Ashok Kumar
    Kumar, Neeraj
    Reddy, Alavalapati Goutham
    Vasilakos, Athanasios V.
    Rodrigues, Joel J. P. C.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (08)
  • [45] Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme
    Qadir, Junaid
    Butun, Ismail
    Gastaldo, Paolo
    Aiello, Orazio
    Caviglia, Daniele D.
    IEEE ACCESS, 2023, 11 : 68301 - 68315
  • [46] Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks
    Mi, Qi
    Stankovic, John A.
    Stoleru, Radu
    WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 163 - 168
  • [47] A Key Predistribution Scheme with Matrix Decomposition for Secure Wireless Sensor Networks
    Dai, Hangyang
    Xu, Hongbing
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 1724 - 1727
  • [48] A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks
    Zhang, Yuexin
    Xiang, Yang
    Huang, Xinyi
    Xu, Li
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 526 - 541
  • [49] A Key Loss Recovery Scheme for Secure Broadcasts in Wireless Sensor Networks
    Ali, Syed Taha
    Sivaraman, Vijay
    Dhamdhere, Ashay
    Ostry, Diethelm
    2008 IEEE 19TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2008, : 1625 - +
  • [50] A Secure Key Pre-distribution Scheme for Wireless Sensor Networks
    Liu, Ming
    Wei, Wei
    Liu, Zhihong
    ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, 2009, : 1753 - +