An efficient location-based compromise-tolerant key management scheme for sensor networks

被引:22
|
作者
Duan, Mei-jiao [1 ]
Xu, Jing [1 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Inst Software, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptography; Wireless sensor networks; Security in digital systems; Key management; Location;
D O I
10.1016/j.ipl.2011.02.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location information has been paid much more attention in sensor network key management schemes. In 2006, Zhang et al. proposed a location-based key management scheme by binding private keys of individual nodes to both their identities and locations. In this Letter, however, we show that their scheme cannot resist key compromise impersonation (KCI) attack, and does not achieve forward secrecy. In fact, an adversary who compromises the location-based secret key of a sensor node A, can masquerade as any other legitimate node or even fake a node to establish the shared key with A, as well as decrypt all previous messages exchanged between A and its neighboring nodes. We then propose a new scheme which provides KCI resilience, perfect forward secrecy and is also immune to various known types of attacks. Moreover, our scheme does not require any pairing operation or map-to-point hash operation, which is more efficient and more suitable for low-power sensor nodes. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:503 / 507
页数:5
相关论文
共 50 条
  • [21] An Energy Efficient Key Management Scheme for Body Sensor Networks
    Zhao, Huawei
    Qin, Jing
    Hu, Jiankun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (11) : 2202 - 2210
  • [22] Efficient Group Key Management Scheme in Wireless Sensor Networks
    Li, Guorui
    Wang, Ying
    He, Jingsha
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 411 - 415
  • [23] A secure and efficient key management scheme for wireless sensor networks
    Kim, Yong Ho
    Lee, Hwaseong
    Lee, Dong Hoon
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 162 - 167
  • [24] Energy Efficient Key Management Scheme for Wireless Sensor Networks
    Suganthi, N.
    Sumathy, V.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2014, 9 (01) : 71 - 78
  • [25] Analysis for Location-based Key Pre-distribution in Wireless Sensor Networks
    Wang Jing
    Xia Luning
    Jing Jiwu
    ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 2, PROCEEDINGS: IMAGE ANALYSIS, INFORMATION AND SIGNAL PROCESSING, 2009, : 297 - +
  • [26] Secure Location-Based Aggregator Node Selection Scheme in Wireless Sensor Networks
    Bhushan, Bharat
    Sahoo, G.
    PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 21 - 35
  • [27] Location-based pairwise key establishment and data authentication for wireless sensor networks
    Yang, Cungang
    Xiao, Jie
    2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 247 - +
  • [28] An Energy Efficient Traffic-Based Key Management Scheme for Wireless Sensor Networks
    Kousalya, C. Gnana
    Raja, J.
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS, 2009, : 156 - +
  • [29] The Key Management Scheme of Wireless Sensor Networks Based on Key Database
    Wan Ting
    Zhuo Li
    Wei Yan
    Zhang Qing
    Liu Gang
    ISTM/2011: 9TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, 2011, : 710 - 713
  • [30] Securing sensor networks with location-based keys
    Zhang, WC
    Liu, W
    Lou, WJ
    Fang, YG
    2005 IEEE Wireless Communications and Networking Conference, Vols 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1909 - 1914