An Approach Based on Chain Key Predistribution against Sybil Attack in Wireless Sensor Networks

被引:3
|
作者
Cheng, Chunling [1 ,2 ,3 ]
Qian, Yaqiu [1 ]
Zhang, Dengyin [3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
[3] Minist Educ, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
PRE-DISTRIBUTION;
D O I
10.1155/2013/839320
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks (WSN), Sybil attack can destroy the routing and data distributed storage mechanisms through fabricating identity information of legitimate nodes. This paper presents a chain key predistribution based approach against Sybil attack. To enhance the security of common keys between neighboring nodes, during the chain key predistribution phase, our approach uses a lightweight hash function to generate several chain keys by hashing the unique identity information of every node sequentially in the trusted base station. These chain keys construct a pool of chain keys. During the pairwise key authentication establishment phase, a node-to-node chain key based authentication and exchange (CK-AE) protocol is proposed, by which each node can share the unique pairwise key with its neighboring node. The CK-AE protocol is provably secure in the universally composable security model (UCSM). Finally, we analyze our approach from the resilience of network and the performance overhead, and the results show that our approach can not only enhance the ability of resilience to Sybil attack, but also reduce the communication overhead significantly at the cost of a certain amount of computational overhead.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] An attack resistant key predistribution scheme for wireless sensor networks
    Ahlawat, Priyanka
    Dave, Mayank
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (03) : 268 - 280
  • [2] Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks
    Hazra, Prasun
    Giri, Debasis
    Das, Ashok Kumar
    MATHEMATICS AND COMPUTING, 2015, 139 : 135 - 154
  • [3] TBSD: A Defend Against Sybil Attack in Wireless Sensor Networks
    Singh, Rupinder
    Singh, Jatinder
    Singh, Ravinder
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (11): : 90 - 99
  • [4] Group-based key predistribution for wireless sensor networks
    Liu, Donggang
    Ning, Peng
    Du, Wenliang
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (02)
  • [5] Tree-based key predistribution for wireless sensor networks
    Jooyoung Lee
    Daesung Kwon
    Wireless Networks, 2009, 15 : 1140 - 1151
  • [6] Sybil Attack Detection In Wireless Sensor Networks
    Zhukabayeva, T. K.
    Mardenov, E. M.
    Abdildaeva, A. A.
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020), 2020,
  • [7] Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix
    Dai, Hangyang
    Xu, Hongbing
    IEEE SENSORS JOURNAL, 2010, 10 (08) : 1399 - 1409
  • [8] Tree-based key predistribution for wireless sensor networks
    Lee, Jooyoung
    Kwon, Daesung
    WIRELESS NETWORKS, 2009, 15 (08) : 1140 - 1151
  • [9] A Secure Positioning Algorithm against Sybil Attack in Wireless Sensor Networks Based on Number Allocating
    Tang, Qing
    Wang, Jian
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 932 - 936
  • [10] Security approaches for data aggregation in Wireless Sensor Networks against Sybil Attack
    Singh, Surinder
    Saini, Hardeep Singh
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 190 - 193