Title: | an efficient location-based compromise-tolerant key management scheme for sensor networks |
Author: | Duan Mei-Jiao
; Xu Jing
|
Keyword: | Cryptography
; Information management
; Network management
; Sensor nodes
; Sensors
; Telecommunication equipment
; Wireless networks
|
Source: | Information Processing Letters
|
Issued Date: | 2011
|
Volume: | 111, Issue:11, Pages:503-507 | Indexed Type: | EI
|
Department: | (1) State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, China
|
English Abstract: | Location information has been paid much more attention in sensor network key management schemes. In 2006, Zhang et al. proposed a location-based key management scheme by binding private keys of individual nodes to both their identities and locations. In this Letter, however, we show that their scheme cannot resist key compromise impersonation (KCI) attack, and does not achieve forward secrecy. In fact, an adversary who compromises the location-based secret key of a sensor node A, can masquerade as any other legitimate node or even fake a node to establish the shared key with A, as well as decrypt all previous messages exchanged between A and its neighboring nodes. We then propose a new scheme which provides KCI resilience, perfect forward secrecy and is also immune to various known types of attacks. Moreover, our scheme does not require any pairing operation or map-to-point hash operation, which is more efficient and more suitable for low-power sensor nodes. © 2011 Elsevier B.V. All rights reserved. |
WOS ID: | WOS:000290743500001
|
Citation statistics: |
|
Content Type: | 期刊论文
|
URI: | http://ir.iscas.ac.cn/handle/311060/14071
|
Appears in Collections: | 信息安全国家重点实验室_期刊论文
|
File Name/ File Size |
Content Type |
Version |
Access |
License |
|
An efficient location-based compromise-tolerant key management scheme for sensor networks.pdf(144KB) | -- | -- | 限制开放 | -- | 联系获取全文 |
|
Recommended Citation: |
Duan Mei-Jiao,Xu Jing. an efficient location-based compromise-tolerant key management scheme for sensor networks[J]. Information Processing Letters,2011-01-01,111(11):503-507.
|
|
|