Secure Decentralized Data Transfer against Node Capture Attacks for Wireless Sensor Networks

被引:0
作者
Kohno, Eitaro [1 ]
Ohta, Tomoyuki [1 ]
Kakuda, Yoshiaki [1 ]
机构
[1] Hiroshima City Univ, Grad Sch Informat Sci, Asaminami Ku, Hiroshima 7313194, Japan
来源
ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS | 2009年
关键词
wireless sensor networks; security; node capture attack; secret sharing scheme; key refreshment;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In wireless sensor networks, sensor nodes have limited computational power and memory size. The data is vulnerable to attack due to the nature of the systems, so maintaining confidentiality is an important problem. Most security methods are based on common or public key cryptosystems. However, these methods have problems with encryption of data. When nodes try to encrypt data, they must preestablish keys. When nodes send data to the sink node, all of the exchanged information will concentrate in the sink node. This creates a single point of failure. In this paper, we propose a new distribution method resilient against node capture attacks using the Secret Sharing Scheme. In addition, we will confirm the ability of our method to improve resiliency against node capture attacks, comparing it with TinySec, which is the major security architecture of wireless sensor networks. Also, we compare the resiliency to existing pairwise key establishment methods.
引用
收藏
页码:35 / 40
页数:6
相关论文
共 20 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
ALARIFI A, 2006, SASN 06 P 4 ACM WORK, P101
[3]  
[Anonymous], CONT CRYPTOLOGY SCI
[4]  
[Anonymous], C COMP COMM SEC
[5]  
[Anonymous], ACM T INFORM SYSTEM, DOI DOI 10.1145/1053283
[6]  
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[7]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[8]  
CHAN AC, 2004, P IEEE INT C COMM IC, V6, P3743
[9]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[10]  
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548