Practical Attacks on Hybrid Group Key Management for SOHAN
نویسندگان
چکیده
549 Abstract— Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed by the scheme. The first attack enables a long-term but slow data fabrication while other attack causes more severe DoS on the access to cluster sensor nodes.
منابع مشابه
Private Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملKey Encapsulation to Designated Group
Most practical applications use hybrid encryption to deal with large plaintext messages since the efficiency of the public key encryption algorithm is low. As a main part of hybrid encryption schemes, Key Encapsulation Mechanism (KEM) allows a sender to generate a random session key and distribute it to recipient. In some communication scenario, one-to-group model is of importance. In this pape...
متن کاملEffects of Damask Rose (Rosa damascena Mill.) Extract on Chemical, Microbial, and Sensory Properties of Sohan (an Iranian Confection) During Storage
Background: Sohan is an Iranian traditional brittle confection which its ingredients are susceptible to oxidation and microbial contamination during storage. This experimental study was designed to determine the effect of damask rose (Rosa damascena Mill.) extract on some chemical, microbial, and sensory properties of Sohan during storage at 25 °C. Methods: The Sohan ingredients were mixed...
متن کاملIntrusion Aware Group Management Scheme for Manet
MANET security has long been an issue for its infrastructure-less nature. The sort of networks gives rise to authentication and key-management problems in MANETs. The absolute TTP based schemes seem to be infeasible for being adopted in MANETs and so are the non-TTP based self-organized schemes which suffer security problems regarding key identity of nodes. A hybrid scheme can serve the purpose...
متن کاملIND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter
QC-MDPC McEliece attracted significant attention as promising alternative public-key encryption scheme believed to be resistant against quantum computing attacks. Compared to binary Goppa codes, it achieves practical key sizes and was shown to perform well on constrained platforms such as embedded microcontrollers and FPGAs. However, so far none of the published QC-MDPC McEliece/Niederreiter im...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Inform. and Commun. Convergence Engineering
دوره 8 شماره
صفحات -
تاریخ انتشار 2010