Mitigating Sandwich Attacks against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA

被引:3
|
作者
Alzaid, Hani [1 ]
Park, DongGook [2 ]
Nieto, Juan Gonzalez [1 ]
Foo, Ernest [1 ]
机构
[1] Queensland Univ Technol, Informat Secur Inst, Brisbane, Qld 4000, Australia
[2] Sunchon Natl Univ, Sunchon, South Korea
关键词
sandwich attack; wireless sensor network; forward and backward secrecy; key management; process control systems; supervisory control and data acquisition; node;
D O I
10.1109/AINA.2010.93
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Alzaid et al. proposed a forward & backward secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems. The scheme, however, is still vulnerable to an attack called the sandwich attack that can be launched when the adversary captures two sensor nodes at times t(1) and t(2), and then reveals all the group keys used between times t(1) and t(2). In this paper, a fix to the scheme is proposed in order to limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched. Then, the performance analysis for our proposal, Alzaid et al.'s scheme, and Nilsson et al.'s scheme is given.
引用
收藏
页码:859 / 865
页数:7
相关论文
共 50 条
  • [21] A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks
    Anita, E. A. Mary
    Geetha, R.
    Kannan, E.
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1419 - 1433
  • [22] A secure group key management scheme for sensor networks
    Poornima, A. S.
    Amberker, B. B.
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 744 - +
  • [23] A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks
    E. A. Mary Anita
    R. Geetha
    E. Kannan
    Wireless Personal Communications, 2015, 82 : 1419 - 1433
  • [24] A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems
    Li, Longpeng
    Xu, Guangquan
    Jiao, Litao
    Li, Xiaotong
    Wang, Hao
    Hu, Jing
    Xian, Hequn
    Lian, Wenjuan
    Gao, Honghao
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2091 - 2101
  • [25] Mitigating DoS attacks against broadcast authentication in wireless sensor networks
    Ning, Peng
    Liu, An
    Du, Wenliang
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (01)
  • [26] A new secure key management scheme for wireless sensor network
    Msolli, Amina
    Ameur, Haythem
    Helali, Abdelhamid
    Maaref, Hassen
    2017 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND DIAGNOSIS (ICCAD), 2017, : 254 - 257
  • [27] A Secure Hierarchical Key Management Scheme in Wireless Sensor Network
    Zhang, Yiying
    Li, Xiangzhen
    Liu, Jianming
    Yang, Jucheng
    Cui, Baojiang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [28] A secure group key management scheme for wireless cellular networks
    Um, Hwayoung
    Delp, Edward J.
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 414 - +
  • [29] Secure Localization Algorithms Against Localization Attacks in Wireless Sensor Networks
    Tu N. Nguyen
    Vinh V. Le
    Shao-I Chu
    Bing-Hong Liu
    Yao-Chuan Hsu
    Wireless Personal Communications, 2022, 127 : 767 - 792
  • [30] Secure Localization Algorithms Against Localization Attacks in Wireless Sensor Networks
    Nguyen, Tu N.
    Le, Vinh V.
    Chu, Shao-, I
    Liu, Bing-Hong
    Hsu, Yao-Chuan
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (01) : 767 - 792