Mitigating Sandwich Attacks against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA

被引:3
|
作者
Alzaid, Hani [1 ]
Park, DongGook [2 ]
Nieto, Juan Gonzalez [1 ]
Foo, Ernest [1 ]
机构
[1] Queensland Univ Technol, Informat Secur Inst, Brisbane, Qld 4000, Australia
[2] Sunchon Natl Univ, Sunchon, South Korea
来源
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) | 2010年
关键词
sandwich attack; wireless sensor network; forward and backward secrecy; key management; process control systems; supervisory control and data acquisition; node;
D O I
10.1109/AINA.2010.93
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Alzaid et al. proposed a forward & backward secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems. The scheme, however, is still vulnerable to an attack called the sandwich attack that can be launched when the adversary captures two sensor nodes at times t(1) and t(2), and then reveals all the group keys used between times t(1) and t(2). In this paper, a fix to the scheme is proposed in order to limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched. Then, the performance analysis for our proposal, Alzaid et al.'s scheme, and Nilsson et al.'s scheme is given.
引用
收藏
页码:859 / 865
页数:7
相关论文
共 50 条
  • [41] A new key management scheme in heterogeneous wireless sensor networks
    Banihashemian, Saber
    Bafghi, Abbas Ghaemi
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 141 - 146
  • [42] An Efficient Key Management Scheme in Hierarchical Wireless Sensor Networks
    Zhang, Xinyang
    Wang, Jidong
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [43] A dynamic key management scheme for dynamic wireless sensor networks
    Erfani, Seyed Hossein
    Javadi, Hamid H. S.
    Rahmani, Amir Masoud
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1040 - 1049
  • [44] An improved key management scheme for heterogeneity wireless sensor networks
    Ma, Chunguang
    Shang, Zhiguo
    Wang, Huiqiang
    Geng, Guining
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2007, 4864 : 854 - 865
  • [45] Secure SCADA communication by using a modified key management scheme
    Rezai, Abdalhossein
    Keshavarzi, Parviz
    Moravej, Zahra
    ISA TRANSACTIONS, 2013, 52 (04) : 517 - 524
  • [46] Secure key management architecture against sensor-node fabrication attacks
    Dwoskin, Jeffrey
    Xu, Dahai
    Huang, Jianwei
    Chiang, Mung
    Lee, Ruby
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 166 - 171
  • [47] A Key Management and Cross-layer Routing Scheme for Wireless Sensor Networks
    Shang, Fengjun
    Deng, Xiaolin
    Zhou, Yongkui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 119 - 134
  • [48] Study on key management scheme for heterogeneous wireless sensor networks
    秦丹阳
    Ma Jingya
    Zhang Yan
    Yang Songxiang
    Ji Ping
    Feng Pan
    HighTechnologyLetters, 2018, 24 (04) : 343 - 350
  • [49] A Bezier Curve Based Key Management Scheme for Hierarchical Wireless Sensor Networks
    Shen, Yong-Luo
    Zhang, Jun
    Yang, Di-Wei
    Luo, Lin-Bo
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2979 - +
  • [50] Polynomial and matrix based key management security scheme in wireless sensor networks
    Dinker, Aarti Gautam
    Sharma, Vidushi
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (08) : 1563 - 1575