On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks

被引:4
|
作者
Mohaisen, Abedelaziz [2 ]
Choi, Jeong Woon [1 ]
Hong, Dowon [1 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305700, South Korea
[2] Univ Minnesota, Dept Comp Sci, Minneapolis, MN 55455 USA
关键词
Wireless sensor neworks; security architecture; key management; security analysis; PRE-DISTRIBUTION;
D O I
10.3837/tiis.2009.04.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.
引用
收藏
页码:376 / 384
页数:9
相关论文
共 50 条
  • [1] An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
    Haque, Md. Mokammel
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    Huh, Eui-Nam
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (05): : 265 - 279
  • [2] A Secret Key-Based Security Architecture for Wireless Sensor Networks
    Chowdhury, Anuva
    Tanzila, Farzana Alam
    Chowdhury, Shanta
    Haque, Md. Mokammel
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION ENGINEERING (ICCIE), 2015, : 79 - 82
  • [3] Public Key-Based Authentication and En-Route Filtering Scheme in Wireless Sensor Networks
    Yi, Chuanjun
    Yang, Geng
    Dai, Hua
    Liu, Liang
    Li, Ning
    [J]. SENSORS, 2018, 18 (11)
  • [4] An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks
    Cheng, Yuan
    Liu, Yanan
    Zhang, Zheng
    Li, Yanxiu
    [J]. SENSORS, 2023, 23 (14)
  • [5] Separable Public Key-Based Multidimensional Privacy-Preserving Data Aggregation Scheme for Wireless Sensor Networks
    Wang, Mingzhong
    Han, Yukun
    Xue, Jingfeng
    Zhu, Liehuang
    Hasan, A. S. M. Touhidul
    Xiao, Yifan
    [J]. SENSOR LETTERS, 2013, 11 (09) : 1639 - 1643
  • [6] A Security Architecture for Wireless Sensor Networks Based-on Public Key Cryptography
    Yao, Jianbo
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3648 - 3650
  • [7] NPKG: Novel pairwise key generation for resisting key-based threats in Wireless Sensor Network
    Vaneeta, M.
    Swapna Kumar, S.
    [J]. International Journal of Network Security, 2019, 21 (01): : 122 - 129
  • [8] A formally verified decentralized key management architecture for wireless sensor networks
    Law, Yee Wei
    Corin, Ricardo
    Etalle, Sandro
    Hartel, Pieter H.
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2775 : 27 - 39
  • [9] A formally verified decentralized key management architecture for wireless sensor networks
    Law, YW
    Corin, R
    Etalle, S
    Hartel, PH
    [J]. PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2003, 2775 : 27 - 39
  • [10] A Cluster Based Hybrid Architecture for Wireless Sensor Networks
    Yao Ye
    Hilaire, Vincent
    Koukam, Abder
    Cai Wandong
    [J]. ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 2, 2008, : 297 - +