Attack Wireless Sensor Network Using Compromised Key Redistribution

Article Preview

Abstract:

Wireless sensor networks have been widely used in many areas, such as earthquake monitoring, building structure monitoring, and military surveillance. In this work, we focus on the wireless sensor network deployed in the battlefield, using random key predistribution scheme. Based on the node cloning attack, we proposed a new attack scheme, called compromised key redistribution attack, and discussed related attack scenarios. Furthermore, we have exposed that, when the overlapping factor of compromised key set is larger than 0.05, it is almost 90% that the number of distinct compromised keys is 10.5% of the original key pool. This result helps the adversary estimate the approximated size of original key pool by calculating the overlapping factor, thus calculate the probability that malicious nodes successfully establish malicious connections with legitimate nodes.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

920-925

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Information on Smart Dust. http://robotics.eecs.berkeley.edu/~pister/SmartDust/

Google Scholar

[2] C.Y. Chen and H.C. Chao: A survey of key distribution in wireless sensor networks, Security and Communication Networks, published online 2011.

Google Scholar

[3] G. Tia, D. Greenspan, M. Welsh, R. Juang, and A. Alm: Vital Signs Monitoring and Patient Tracking Over a Wireless Network, in Conference of the Engineering in Medicine and Biology Society, (2005), 102-105.

DOI: 10.1109/iembs.2005.1616352

Google Scholar

[4] C. Otto, C. Sanders, and E. Jovanov: System architecture of a wireless body area sensor network for ubiquitous health monitoring, Journal of Mobile Multimedia, 1, (2006), 307-326.

Google Scholar

[5] D.J. Malan, M. Welsh, and M.D. Smith: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in Conference of Sensor and Ad Hoc Communications and Networks (SECON), (2004), 71-80.

DOI: 10.1109/sahcn.2004.1381904

Google Scholar

[6] K. Chintalapudi, T. Fu, J. Paek, N. Kothari, S. Rangwala, J. Caffrey, R. Govindan, E. Johnson, and S. Masri: Monitoring civil structures with a wireless sensor network, Journal of Internet Computing, IEEE, 10, (2006), 26-34.

DOI: 10.1109/mic.2006.38

Google Scholar

[7] A.S.K. Pathan, L. Hyung-Woo, and H. Choong Seon: Security in wireless sensor networks: issues and challenges, in Internation Conference of Advanced Communication Technology(ICACT), (2006), 1043 - 1048.

DOI: 10.1109/icact.2006.206151

Google Scholar

[8] D. Kundur, W. Luh, U.N. Okorafor, and T. Zourntos: Security and Privacy for Distributed Multimedia Sensor Networks, Proceedings of the IEEE, 96, (2008), 112-130.

DOI: 10.1109/jproc.2007.909914

Google Scholar

[9] L. Eschenauer and V. D. Gligor: A key-management scheme for distributed sensor networks, in Proceedings of the 9th ACM Conference on Computer and Communications Security, (2002), 41-47.

DOI: 10.1145/586110.586117

Google Scholar

[10] B. Parno, A. Perrig, and V. Gligor: Distributed detection of node replication attacks in sensor networks, in IEEE Symposium on Security and Privacy, (2005), 49-63.

DOI: 10.1109/sp.2005.8

Google Scholar

[11] Z. Bo, S. Setia, S. Jajodia, S. Roy, and W. Lingyu: Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks, IEEE Transactions on Mobile Computing, 9, (2010), 913-926.

DOI: 10.1109/tmc.2010.40

Google Scholar

[12] W. Yong, G. Attebury, and B. Ramamurthy: A survey of security issues in wireless sensor networks, IEEE Journal of Communications Surveys & Tutorials, 8, (2006), 2-23.

DOI: 10.1109/comst.2006.315852

Google Scholar