A (M, m) Authentication Scheme Against Mobile Sink Replicated Attack in Unattended Sensor Networks

被引:7
作者
Li, Sujun [1 ,2 ]
Wang, Weiping [1 ]
Zhou, Boqing [2 ]
Wang, Jianxin [1 ]
Cheng, Yun [2 ]
Wu, Jie [3 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Hunan Univ Humanities Sci & Technol, Dept Informat, Loudi 417000, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
基金
中国国家自然科学基金;
关键词
Unattended sensor networks; MS replicated attack; security communication protocol;
D O I
10.1109/LWC.2017.2770119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In some non-real time applications, data is collected by mobile sinks (MSs). This kind of network is vulnerable to MSs replicated attack. In this attack, replicated MSs can collect data from sensor nodes by establishing pairwise keys with them using keys information obtained from captured sensors. In this letter, a (M, m) authentication scheme against the attack is proposed. The analysis and simulation results indicate that the scheme can improve networks' resilience against MS replicated attack as compared with existing schemes.
引用
收藏
页码:250 / 253
页数:4
相关论文
共 9 条
[1]  
[Anonymous], 2005, ACM T INFORM SYST SE, DOI DOI 10.1145/1053283.1053287
[2]   Perfectly secure key distribution for dynamic conferences [J].
Blundo, C ;
De Santis, A .
INFORMATION AND COMPUTATION, 1998, 146 (01) :1-23
[3]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[4]   United We Stand: Intrusion Resilience in Mobile Unattended WSNs [J].
Di Pietro, Roberto ;
Oligeri, Gabriele ;
Soriente, Claudio ;
Tsudik, Gene .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (07) :1456-1468
[5]  
ESCHENAUER L, 2002, ACM CCS 02 P NOV, P243
[6]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[7]   A Secure Scheme for Heterogeneous Sensor Networks [J].
Li, Sujun ;
Wang, Weiping ;
Zhou, Boqing ;
Wang, Jianxin ;
Cheng, Yun ;
Wu, Jie .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2017, 6 (02) :182-185
[8]   The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks [J].
Rasheed, Amar ;
Mahapatra, Rabi N. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (05) :958-965
[9]  
Zhu S., 2006, ACM T SENSOR NETWORK, V2, P500, DOI DOI 10.1145/1218556.1218559