Security of the Multiple-Key Blom's Key Agreement Scheme for Sensor Networks

被引:0
|
作者
Yang, Mee Loong [1 ]
Al Anbuky, Adnan [2 ]
Liu, William [1 ]
机构
[1] Auckland Univ Technol, Sch Comp & Math Sci, Auckland, New Zealand
[2] Auckland Univ Technol, Sch Engn, Auckland, New Zealand
来源
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014 | 2014年 / 428卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of the Multiple-Key Blom's (MKB) key agreement scheme is analysed. We considered how the scheme may be broken by a very powerful and well resourced adversary who is able to capture any number of nodes to extract all the sensitive keying material. We showed that by choosing suitable keying parameters, the captured private keys cannot be used directly to break the scheme. Each captured key must first be correctly associated with the public key and master key used to compute it. The chances of finding this private-public-master-key association (PPMka) can be made extremely small and would require the attacker to capture a very large number of nodes, or try an extremely large number of possible solutions. This allows the scheme to be secure for use in large networks, overcoming the limitations in the original Blom's scheme. We obtained some analytical results and compared them to those from computer simulated attacks on the scheme.
引用
收藏
页码:66 / 79
页数:14
相关论文
共 50 条
  • [1] The Multiple-Key Blom's Scheme for Key Establishment in Mobile Ad Hoc Sensor Networks
    Yang, Mee Loong
    Al-Anbuky, Adnan
    Liu, William
    2013 19TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC): SMART COMMUNICATIONS TO ENHANCE THE QUALITY OF LIFE, 2013, : 427 - 432
  • [2] Security of authenticated multiple-key agreement protocols
    Wu, TS
    He, WH
    Hsu, CL
    ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392
  • [3] Improved authenticated multiple-key agreement protocol
    Yen, SM
    Joye, M
    ELECTRONICS LETTERS, 1998, 34 (18) : 1738 - 1739
  • [4] Improved authenticated multiple-key agreement protocol
    Yeh, HT
    Sun, HM
    Hwang, T
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2003, 46 (2-3) : 207 - 211
  • [5] Vulnerability of two multiple-key agreement protocols
    Farash, Mohammad Sabzinejad
    Bayat, Majid
    Attari, Mahmoud Ahmadian
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 199 - 204
  • [6] On the Security of a Key Agreement and Key Protection Scheme
    Han, Yunxia
    Xu, Chunxiang
    He, Debiao
    Chen, Kefei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3293 - 3294
  • [7] ICMDS: Secure inter-cluster multiple-key distribution scheme for wireless sensor networks
    Mehmood, Amjad
    Umar, Muhammad Muneer
    Song, Houbing
    AD HOC NETWORKS, 2017, 55 : 97 - 106
  • [8] An Authenticated Key Agreement Scheme for Wireless Sensor Networks
    Yang, Mee Loong
    Al-Anbuky, Adnan
    Liu, William
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2014, 3 (03): : 181 - 206
  • [9] Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks
    Jung, Jaewook
    Moon, Jongho
    Lee, Donghoon
    Won, Dongho
    SENSORS, 2017, 17 (03)
  • [10] Unknown key-share attack on authenticated multiple-key agreement protocol
    Shim, K
    ELECTRONICS LETTERS, 2003, 39 (01) : 38 - 39