An efficient location-based compromise-tolerant key management scheme for sensor networks

被引:22
|
作者
Duan, Mei-jiao [1 ]
Xu, Jing [1 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Wireless sensor networks; Security in digital systems; Key management; Location;
D O I
10.1016/j.ipl.2011.02.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location information has been paid much more attention in sensor network key management schemes. In 2006, Zhang et al. proposed a location-based key management scheme by binding private keys of individual nodes to both their identities and locations. In this Letter, however, we show that their scheme cannot resist key compromise impersonation (KCI) attack, and does not achieve forward secrecy. In fact, an adversary who compromises the location-based secret key of a sensor node A, can masquerade as any other legitimate node or even fake a node to establish the shared key with A, as well as decrypt all previous messages exchanged between A and its neighboring nodes. We then propose a new scheme which provides KCI resilience, perfect forward secrecy and is also immune to various known types of attacks. Moreover, our scheme does not require any pairing operation or map-to-point hash operation, which is more efficient and more suitable for low-power sensor nodes. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:503 / 507
页数:5
相关论文
共 50 条
  • [1] Location-based compromise-tolerant security mechanisms for wireless sensor networks
    Zhang, YC
    Liu, W
    Lou, WJ
    Fang, YG
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 247 - 260
  • [2] VLKM: Virtual Location-Based Key Management Scheme for Wireless Sensor Networks
    Vaid, Rohit
    Katiyar, Vijay
    2014 INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2014, : 53 - 61
  • [3] A compromise-tolerant key management framework for private blockchain
    Becherer, Marius
    Bui-Nguyen, Thien
    Zipperle, Michael
    Gottwalt, Florian
    Engineering Intelligent Systems, 2020, 28 (03): : 185 - 191
  • [4] PKChain: Compromise-Tolerant and Verifiable Public Key Management System
    Mosakheil, Jamal H.
    Yang, Kan
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (03): : 3130 - 3144
  • [5] A Group Management Scheme for an Efficient Location-Based Service
    Lee, Junghoon
    Park, Gyung-Leen
    Sung, Chang Oan
    Kim, Sang-Wook
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 1705 - +
  • [6] Location-Based Key Management Structure for Secure Group Communication in Wireless Sensor Networks
    Kim, Jin Myoung
    Cho, Tae Ho
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (09) : 2183 - 2189
  • [7] Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks
    Choi, Jaewoo
    Bang, Jihyun
    Kim, LeeHyung
    Ahn, Mirim
    Kwon, Taekyoung
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 494 - 502
  • [8] A Location-Based Channel Assignment Scheme in Wireless Sensor Networks
    Shi, Shuo
    Xu, Enwei
    Gu, Xuemai
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [9] Location-Based Pairwise Key Predistribution for Wireless Sensor Networks
    Kwon, Taekyoung
    Lee, JongHyup
    Song, JooSeok
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (11) : 5436 - 5442
  • [10] Efficient Key Management Scheme in Wireless Sensor Networks
    Zhao, Shen
    Zheng, Jun
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1132 - 1136