An efficient key management solution to node capture attack for WSN

Author(s):  
P. Ahlawat ◽  
M. Dave
Author(s):  
Priyanka Ahlawat ◽  
Mayank Dave

To create a secure communication among the sensor nodes, a key establishment scheme is very important. Wireless sensor networks (WSN) are usually left unattended and thus may attract the adversary to launch several attacks to the network operation. The exposure of the key during a node capture may disturb a large part of network communication. If there is a reliable, efficient, and secure KMS, disruption in the network to such an extent may not occur during a node capture attack. Several researchers have presented several key agreement schemes, but still the area is open to design an efficient attack resistant KMS. Sometimes, during the design of security protocols, the assumptions taken for the adversary behavior in sensor field may not reflect their actual behavior of the adversary in sensor field making these schemes less feasible in many real-world WSN applications. This chapter first discusses the challenges and security requirements, node capture attacks, its impact on the network, and some open issues of KMS solutions to this problem.


Author(s):  
Hani Alzaid ◽  
DongGook Park ◽  
Juan Gonzàlez Nieto ◽  
Colin Boyd ◽  
Ernest Foo

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor network applications. The PCS/ SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in this environment, however, are still open to devastating attacks such as node capture, which makes the design of secure key management challenging. This chapter introduces an adversary model with which we can assess key management protocols. It also proposes a key management scheme to defeat node capture attack by offering both forward and backward secrecies. The scheme overcomes the pitfalls of a comparative scheme while being not computationally more expensive.


2016 ◽  
Vol 9 (18) ◽  
pp. 5502-5517 ◽  
Author(s):  
Chi Lin ◽  
Tie Qiu ◽  
Mohammad S. Obaidat ◽  
Chang Wu Yu ◽  
Lin Yao ◽  
...  

2019 ◽  
Vol 13 (1) ◽  
pp. 238-247 ◽  
Author(s):  
Sarita Agrawal ◽  
Manik Lal Das ◽  
Javier Lopez

Author(s):  
Bhavana Butani ◽  
Piyush Kumar Shukla ◽  
Sanjay Silakari

Wireless sensor networks are utilized in vital situations like military and commercial applications, traffic surveillance, habitat monitoring, and many other applications. WSNs have to face various issues and challenges in terms of memory, communication, energy, computation, and storage, which require efficient management of huge amount of sensor data. Therefore, storage is an important issue in the WSN. Emergence of Sensor-Cloud infrastructure overcomes several shortcomings of WSN such as storage capacity and offers high processing capabilities for huge sensor data. Security is also the major challenge that is faced by the sensor network. This chapter includes a brief overview of the importance of cloud computing in sensor networks and the goal of DDoS and Node Capture Attack in WSN. This chapter includes descriptions of different modeling techniques of Node Capture attack and various detection and key pre-distribution schemes to invent a new technique to improve network resilience against node capture attacks.


Sign in / Sign up

Export Citation Format

Share Document