An Approach Based on Chain Key Predistribution against Sybil Attack in Wireless Sensor Networks

被引:3
|
作者
Cheng, Chunling [1 ,2 ,3 ]
Qian, Yaqiu [1 ]
Zhang, Dengyin [3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
[3] Minist Educ, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
PRE-DISTRIBUTION;
D O I
10.1155/2013/839320
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks (WSN), Sybil attack can destroy the routing and data distributed storage mechanisms through fabricating identity information of legitimate nodes. This paper presents a chain key predistribution based approach against Sybil attack. To enhance the security of common keys between neighboring nodes, during the chain key predistribution phase, our approach uses a lightweight hash function to generate several chain keys by hashing the unique identity information of every node sequentially in the trusted base station. These chain keys construct a pool of chain keys. During the pairwise key authentication establishment phase, a node-to-node chain key based authentication and exchange (CK-AE) protocol is proposed, by which each node can share the unique pairwise key with its neighboring node. The CK-AE protocol is provably secure in the universally composable security model (UCSM). Finally, we analyze our approach from the resilience of network and the performance overhead, and the results show that our approach can not only enhance the ability of resilience to Sybil attack, but also reduce the communication overhead significantly at the cost of a certain amount of computational overhead.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
    Arshad, Akashah
    Hanapi, Zurina Mohd
    Subramaniam, Shamala
    Latip, Rohaya
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 33
  • [32] Detecting Sybil Attack based on State Information in Underwater Wireless Sensor Networks
    Li, Xun
    Han, Guangjie
    Qian, Aihua
    Shu, Lei
    Rodrigues, Joel
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 116 - 120
  • [33] A Hybrid Approach for Path Vulnerability Matrix on Random Key Predistribution for Wireless Sensor Networks
    Ahlawat, Priyanka
    Dave, Mayank
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 3327 - 3353
  • [34] Dynamic Resiliency Analysis of Key Predistribution in Wireless Sensor Networks
    Durahim, Ahmet Onur
    Levi, Albert
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 977 - 982
  • [35] A General Pairwise Key Predistribution Scheme for Wireless Sensor Networks
    DING Xiaoyu1
    2. Department of Basical Courses
    WuhanUniversityJournalofNaturalSciences, 2008, (06) : 744 - 748
  • [36] Intragroup and Intergroup Pairwise Key Predistribution for Wireless Sensor Networks
    Yang, Ching-Nung
    Gu, Ting-Song
    You, Jhou-Cian
    Wang, Chang-Ji
    SENSORS, 2025, 25 (01)
  • [37] On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
    Martin, Keith M.
    CODING AND CRYPTOLOGY, PROCEEDINGS, 2009, 5557 : 124 - 145
  • [38] Analysis of Latency in Secure Wireless Sensor Networks with Key Predistribution
    Subramanian, Ramanan
    Chan, Kevin
    Fekri, Faramarz
    2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 2120 - 2124
  • [39] Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks
    Gu, Wenjun
    Chellappan, Sriram
    Bai, Xiaole
    Wang, Honggang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (04) : 1370 - 1381
  • [40] A Hybrid Approach for Path Vulnerability Matrix on Random Key Predistribution for Wireless Sensor Networks
    Priyanka Ahlawat
    Mayank Dave
    Wireless Personal Communications, 2017, 94 : 3327 - 3353