https://scholars.lib.ntu.edu.tw/handle/123456789/342581
Title: | A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks | Authors: | Li Chen Chia-Chang Hsu Chin-Laung Lei CHIN-LAUNG LEI |
Keywords: | HELLO flood attack; Location-based key establishment; Node cloning; Sybil attack | Issue Date: | Sep-2008 | Source: | International Workshop on Wireless Technologies for Smart Homes | Abstract: | Sensor networks are usually consist of thousands of resource-limited nodes and are deployed in a designated area without any fixed infrastructure. While the establishment of the pairwise keys between any pair of adjacent nodes to build a secure link remains the main concern in the design of key management protocols, malicious attacks aim at routing information, exhaust node's resource, and compromised secrets can misdirect the data flow or denial the network service with relatively small effort. Many mission-critic sensor network applications demand an effective, light, and flexible algorithm yet robust under attacks. Based on the LEAP+ scheme, we propose an improved LEAP+ by adding location information into the key establishment phase. By identifying the correctness of the id-location pair, our scheme effectively limits the Sybil attack and mitigates the damage of HELLO flood attack and node cloning attack. We furthermore propose an authentication phase in our scheme to defend possible replay attacks. The analysis shows that our scheme is more robust than LEAP+ with only minor increase of computation overhead. Copyright 2008 ACM. |
URI: | http://scholars.lib.ntu.edu.tw/handle/123456789/342581 | DOI: | 10.1145/1506270.1506395 | SDG/Keyword: | Adjacent nodes; Computation overheads; Data flow; HELLO flood attack; Key establishments; Key management protocols; Location information; Location-based key establishment; Malicious attack; Network services; Node cloning; Pairwise key; Replay attack; Routing information; Sensor network applications; Sybil attack; Ad hoc networks; Cloning; Network protocols; Network security; Public key cryptography; Routing protocols; Sensor networks; Telecommunication equipment; Wireless sensor networks; Computer crime |
Appears in Collections: | 電機工程學系 |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.