[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Foisting and Stealing of Keys in Sensor Networks

  • Conference paper
Wireless Sensor Networks (EWSN 2012)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 7158))

Included in the following conference series:

  • 1834 Accesses

Abstract

We consider cryptographic key establishment in sensor networks without PKI or trusted third parties, using pairwise trust relationships between intermediaries. We describe a novel attack called key foisting that defeats current schemes, compromising 90% of the path keys with only 10% of the sensors in the network seized. We then present a two-way path-key establishment scheme that resists foisting. It reduces the probability of successful key foisting to nearly zero even with 20% of sensors seized. Its overhead is affordable, and its resilience is excellent.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Comput. Netw. 54, 2787–2805 (2010)

    Article  MATH  Google Scholar 

  2. Vermesan, O., Harrison, M., Vogt, H., Kalaboukas, K., Tomasella, M., Wouters, K., Gusmeroli, S., Haller, S.: Internet of things—strategic research roadmap. Technical report, European Commission - Information Society and Media DG (2009)

    Google Scholar 

  3. Adams, C., Lloyd, S.: Understanding PKI: Concepts, Standards, and Deployment Considerations, 2nd edn. Addison-Wesley Longman Publishing Co., Inc., Boston (2002)

    Google Scholar 

  4. Schneier, B.: Applied cryptography: Protocols, algorithms, and source code in c, 2nd edn. Wiley (1995)

    Google Scholar 

  5. Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 278–287. ACM, New York (2006)

    Google Scholar 

  6. Di Pietro, R., Mancini, L., Jajodia, S.: Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1, 455–468 (2003)

    Article  Google Scholar 

  7. Douceur, J.R.: The sybil attack. In: 1st International Workshop on Peer-to-Peer Systems (2002)

    Google Scholar 

  8. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2002)

    Google Scholar 

  9. Ni, J., Zhou, L., Ravishankar, C.V.: Dealing with random and selective attacks in wireless sensor systems. ACM Transactions on Sensor Networks 6 (2010)

    Google Scholar 

  10. Przydatek, B., Song, D., Perrig, A.: Sia: secure information aggregation in sensor networks. In: SenSys 2003: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, pp. 255–265. ACM, New York (2003)

    Google Scholar 

  11. Chan, H., Perrig, A.: Pike: Peer intermediaries for key establishment in sensor networks. In: Proceedings of IEEE Infocom., pp. 524–535 (2005)

    Google Scholar 

  12. Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8, 228–258 (2005)

    Article  Google Scholar 

  13. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: CCS 2003: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61. ACM, New York (2003)

    Google Scholar 

  14. Liu, D., Ning, P., Du, W.: Group-based key predistribution for wireless sensor networks. ACM Trans. Sen. Netw. 4, 1–30 (2008)

    Article  Google Scholar 

  15. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: SP 2003: Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 197. IEEE Computer Society, Washington, DC (2003)

    Chapter  Google Scholar 

  16. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM, New York (2002)

    Google Scholar 

  17. Di Pietro, R., Mancini, L.V., Mei, A., Panconesi, A., Radhakrishnan, J.: Redoubtable sensor networks. ACM Trans. Inf. Syst. Secur. 11, 13:1–13:22 (2008)

    Google Scholar 

  18. Blom, R.: An Optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  19. Li, G., Ling, H., Znati, T.: Path key establishment using multiple secured paths in wireless sensor networks. In: CoNEXT 2005: Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, pp. 43–49. ACM, New York (2005)

    Google Scholar 

  20. Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks (TOSN) 2, 528 (2006)

    Article  Google Scholar 

  21. Dolev, D., Yao, A.C.: On the security of public key protocols. In: Annual IEEE Symposium on Foundations of Computer Science, pp. 350–357 (1981)

    Google Scholar 

  22. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259–268. ACM, New York (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Gian Pietro Picco Wendi Heinzelman

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, P., Ravishankar, C. (2012). Foisting and Stealing of Keys in Sensor Networks. In: Picco, G.P., Heinzelman, W. (eds) Wireless Sensor Networks. EWSN 2012. Lecture Notes in Computer Science, vol 7158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28169-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28169-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28168-6

  • Online ISBN: 978-3-642-28169-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics