A cost-effective attack matrix based key management scheme with dominance key set for wireless sensor network security

被引:4
作者
Ahlawat, Priyanka [1 ]
Dave, Mayank [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
attack model; node capture; random key predistribution scheme; wireless sensor network; PREDISTRIBUTION;
D O I
10.1002/dac.3713
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To guarantee the proper functionality of wireless sensor network even in the presence of the potential threats, a well-designed key management scheme is very important. The assumptions about attackers critically influence the performance of security mechanisms. This paper investigates the problem of node capture from adversarial view point in which the adversary intelligently exploits the different vulnerabilities of the network to establish a cost-effective attack matrix. To counteract such attacks, the defender or the network designer constructs similar attack matrix. The defender will identify a set of critical nodes and use the key compromise relationship to assign a key dominance rank to each node of the network. The key dominance rank quantifies the possibility of attack on a particular node. It is used to determine the hash chain length. It is also used to improve the security of path key establishment as well as rekeying of the proposed scheme. The performance of the proposed scheme is analyzed with other existing schemes, and it is shown that it outperforms with increased resilience against node capture, reduced number of hash computations, reduced key compromise probability of proxy nodes, and reduced number of revoked links during rekeying process.
引用
收藏
页数:24
相关论文
共 41 条
[1]  
Ahlawat P, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), P321, DOI 10.1109/COMPTELIX.2017.8003987
[2]   A Hybrid Approach for Path Vulnerability Matrix on Random Key Predistribution for Wireless Sensor Networks [J].
Ahlawat, Priyanka ;
Dave, Mayank .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) :3327-3353
[3]  
Ahlawat P, 2016, 2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), P253, DOI 10.1109/PDGC.2016.7913154
[4]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[5]  
An W, 2014, SECUR COMM NETWORK, V9, P862, DOI 10. 1002/sec. 932
[6]  
[Anonymous], INFOCOM 2004 23 ANN
[7]  
[Anonymous], P WCNIS
[8]  
[Anonymous], 2002, ACM C COMP COMM SEC
[9]   A new class of Hash-Chain based key pre-distribution schemes for WSN [J].
Bechkit, Walid ;
Challal, Yacine ;
Bouabdallah, Abdelmadjid .
COMPUTER COMMUNICATIONS, 2013, 36 (03) :243-255
[10]  
Benenson Z, 2010, IT-INF TECHNOL, V52, P320, DOI 10.1524/itit.2010.0609