An efficient location-based compromise-tolerant key management scheme for sensor networks

被引:22
|
作者
Duan, Mei-jiao [1 ]
Xu, Jing [1 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Wireless sensor networks; Security in digital systems; Key management; Location;
D O I
10.1016/j.ipl.2011.02.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location information has been paid much more attention in sensor network key management schemes. In 2006, Zhang et al. proposed a location-based key management scheme by binding private keys of individual nodes to both their identities and locations. In this Letter, however, we show that their scheme cannot resist key compromise impersonation (KCI) attack, and does not achieve forward secrecy. In fact, an adversary who compromises the location-based secret key of a sensor node A, can masquerade as any other legitimate node or even fake a node to establish the shared key with A, as well as decrypt all previous messages exchanged between A and its neighboring nodes. We then propose a new scheme which provides KCI resilience, perfect forward secrecy and is also immune to various known types of attacks. Moreover, our scheme does not require any pairing operation or map-to-point hash operation, which is more efficient and more suitable for low-power sensor nodes. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:503 / 507
页数:5
相关论文
共 50 条
  • [11] An Efficient Key Management Scheme for Heterogeneous Sensor Networks
    Yang, Qing
    Li, Qiaoliang
    Li, Sujun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3735 - +
  • [12] An Efficient Key Management Scheme for Heterogeneous Sensor Networks
    Du, Xiaojiang
    Xiao, Yang
    Guizani, Sghaier
    Chen, Hsiao-Hwa
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [13] An efficient key management scheme for secure sensor networks
    Du, RY
    Tu, HJ
    Wen, S
    PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 279 - 283
  • [14] An Efficient Key Management Scheme for Wireless Sensor Networks
    Du, Dahai
    Xiong, Huagang
    Wang, Hailiang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [15] Efficient Indoor Location-Based System using Sensor Networks
    Kim, Jonghyun
    Lee, Dongho
    Chung, Kwangsue
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 134 - 140
  • [16] Location-based design for secure and efficient wireless sensor networks
    Yang, Cungang
    Li, Celia
    Xiao, Jie
    COMPUTER NETWORKS, 2008, 52 (16) : 3119 - 3129
  • [17] Energy-efficient Location-dependent Key Management Scheme for Wireless Sensor Networks
    He, Lin
    Zhang, Yi-Ying
    Shu, Lei
    Vasilakos, Athanasios V.
    Park, Myong-Soon
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [18] AN EFFICIENT SESSION KEY MANAGEMENT SCHEME FOR CLUSTER BASED WIRELESS SENSOR NETWORKS
    Patel, Vaishali
    Gheewala, Jaydeep
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 963 - 967
  • [19] An Efficient CPK-based Key Management Scheme in Wireless Sensor Networks
    Zheng, Jun
    Chen, Zhifu
    Xue, Jinrong
    Wu, Fan
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1093 - 1099
  • [20] An Efficient Key Management Scheme in Hierarchical Wireless Sensor Networks
    Zhang, Xinyang
    Wang, Jidong
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,