Title :
Revisiting Key-Swapping Collusion Attack on Distributed Sensor Networks
Author :
Tran, Thanh Dai ; Agbinya, Johnson I.
Author_Institution :
Fac. of Eng. & Inf. Technol., Univ. of Technol. Sydney, Sydney, NSW, Australia
Abstract :
Recent study has demonstrated that quite a few well-know pairwise key establishment schemes are susceptible to key-swapping collusion attack aiming to subvert crucial applications that require cooperative efforts, e.g., data fusion algorithms, routing protocols, etc. Previous works against this attack have shown their own limitations. To overcome these limitations, we propose a new countermeasure in this paper. Our approach makes good use of symmetric-key cryptographic primitives and a hidden one-way hash chain to avoid unreasonable assumptions and/or costly methods, and guarantee network scalability. The intensive security analysis reveals that the countermeasure eliminates the possibility of the attack under normal conditions with only a tiny increase in under the worst case. This susceptibility can be eliminated by some additional mechanisms. Lastly, performance overheads are well justified by theoretical analyses and simulation to be suitable for current sensor node generations.
Keywords :
cryptographic protocols; public key cryptography; telecommunication network routing; telecommunication security; wireless sensor networks; current sensor node generations; data fusion algorithms; distributed sensor networks; hidden one-way hash chain; intensive security analysis; key-swapping collusion attack; pairwise key establishment schemes; routing protocols; symmetric-key cryptographic primitives; Elliptic curve cryptography; Encryption; Protocols; Servers; Distributed sensor networks; collusion attacks; countermeasures; key establishment; key-swapping; security;
Conference_Titel :
Sensor Technologies and Applications (SENSORCOMM), 2010 Fourth International Conference on
Conference_Location :
Venice
Print_ISBN :
978-1-4244-7538-4
DOI :
10.1109/SENSORCOMM.2010.63