Mitigating Sandwich Attacks against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA

被引:3
|
作者
Alzaid, Hani [1 ]
Park, DongGook [2 ]
Nieto, Juan Gonzalez [1 ]
Foo, Ernest [1 ]
机构
[1] Queensland Univ Technol, Informat Secur Inst, Brisbane, Qld 4000, Australia
[2] Sunchon Natl Univ, Sunchon, South Korea
来源
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) | 2010年
关键词
sandwich attack; wireless sensor network; forward and backward secrecy; key management; process control systems; supervisory control and data acquisition; node;
D O I
10.1109/AINA.2010.93
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Alzaid et al. proposed a forward & backward secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems. The scheme, however, is still vulnerable to an attack called the sandwich attack that can be launched when the adversary captures two sensor nodes at times t(1) and t(2), and then reveals all the group keys used between times t(1) and t(2). In this paper, a fix to the scheme is proposed in order to limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched. Then, the performance analysis for our proposal, Alzaid et al.'s scheme, and Nilsson et al.'s scheme is given.
引用
收藏
页码:859 / 865
页数:7
相关论文
共 50 条
  • [21] An Unconditionally Secure Key Management Scheme for Large-Scale Heterogeneous Wireless Sensor Networks
    Das, Ashok Kumar
    2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS 2009), 2009, : 653 - 662
  • [22] Secure Localization Algorithms Against Localization Attacks in Wireless Sensor Networks
    Tu N. Nguyen
    Vinh V. Le
    Shao-I Chu
    Bing-Hong Liu
    Yao-Chuan Hsu
    Wireless Personal Communications, 2022, 127 : 767 - 792
  • [23] A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks
    Alagheband, Mandi R.
    Aref, Mohammad Reza
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 18 - +
  • [24] Information attacks and security in wireless sensor networks of industrial SCADA systems
    Finogeev, Alexey G.
    Finogeev, Anton A.
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2017, 5 : 6 - 16
  • [25] Mobility Based Key Management Security Scheme for Wireless Sensor Networks
    Lalitha, T.
    Jayaprabha, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (02) : 349 - 367
  • [26] An efficient key management scheme in wireless sensor networks for smart grid
    Guan, Zhitao
    Xu, Yue
    Yang, Tingting
    Shi, Ruifeng
    Sensor Letters, 2014, 12 (02) : 414 - 419
  • [27] Quorum-based Key Management Scheme in Wireless Sensor Networks
    Wuu, Lih-Chyau
    Hung, Chi-Hsiang
    Chang, Chia-Ming
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (09): : 2442 - 2454
  • [28] Mobility Based Key Management Security Scheme for Wireless Sensor Networks
    T. Lalitha
    S. Jayaprabha
    Wireless Personal Communications, 2016, 87 : 349 - 367
  • [29] Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks
    Mi, Qi
    Stankovic, John A.
    Stoleru, Radu
    WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 163 - 168
  • [30] Packet Hiding Using Cryptography with Advanced Key Management against Counter Jamming Attacks in Wireless Sensor Networks
    Swaminathan, S.
    Suganya, S.
    Ambika, K.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,