DocumentCode
3238306
Title
Resisting node spoofing attacks in random key predistribution schemes: A uniform design
Author
Chan, Kevin ; Fekri, Faramarz
Author_Institution
Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA
fYear
2009
fDate
March 30 2009-April 1 2009
Firstpage
1
Lastpage
5
Abstract
Current key predistribution schemes for wireless sensor networks derive the merit of their performance based on the resilience of secure communication links to node-compromise attacks. As an adversarial entity gathers key information, it is able to mount attacks by spoofing or eavesdropping on networked communications with growing success. A powerful variety of attack is possible with a spoofed node, which is when the adversary is able to present itself as a legitimate identity in the network and not be detected. This work considers the security of wireless sensor networks with a priority on node-spoofing attacks. We propose node-spoofing attack models to classify various adversarial capabilities. We then propose two new key predistribution techniques as variants to random key predistribution, which provide improved resilience to node-spoofing attacks.
Keywords
telecommunication security; wireless sensor networks; node-compromise attacks; random key predistribution schemes; resisting node spoofing attacks; secure communication links; wireless sensor networks; Base stations; Chemical sensors; Computer networks; Data security; Design engineering; Public key cryptography; Relays; Resilience; Temperature sensors; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Sarnoff Symposium, 2009. SARNOFF '09. IEEE
Conference_Location
Princeton, NJ
Print_ISBN
978-1-4244-3381-0
Electronic_ISBN
978-1-4244-3382-7
Type
conf
DOI
10.1109/SARNOF.2009.4850379
Filename
4850379
Link To Document