Practical Attacks on Hybrid Group Key Management for SOHAN

نویسندگان

  • Jiun-Hau Liew
  • Ivy Ong
  • Sanggon Lee
  • Hyotaek Lim
  • Hoon-Jae Lee
چکیده

549 Abstract— Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed by the scheme. The first attack enables a long-term but slow data fabrication while other attack causes more severe DoS on the access to cluster sensor nodes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Key Encapsulation to Designated Group

Most practical applications use hybrid encryption to deal with large plaintext messages since the efficiency of the public key encryption algorithm is low. As a main part of hybrid encryption schemes, Key Encapsulation Mechanism (KEM) allows a sender to generate a random session key and distribute it to recipient. In some communication scenario, one-to-group model is of importance. In this pape...

متن کامل

Effects of Damask Rose (Rosa damascena Mill.) Extract on Chemical, Microbial, and Sensory Properties of Sohan (an Iranian Confection) During Storage

Background: Sohan is an Iranian traditional brittle confection which its ingredients are susceptible to oxidation and microbial contamination during storage. This experimental study was designed to determine the effect of damask rose (Rosa damascena Mill.) extract on some chemical, microbial, and sensory properties of Sohan during storage at 25 °C. Methods: The Sohan ingredients were mixed...

متن کامل

Intrusion Aware Group Management Scheme for Manet

MANET security has long been an issue for its infrastructure-less nature. The sort of networks gives rise to authentication and key-management problems in MANETs. The absolute TTP based schemes seem to be infeasible for being adopted in MANETs and so are the non-TTP based self-organized schemes which suffer security problems regarding key identity of nodes. A hybrid scheme can serve the purpose...

متن کامل

IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter

QC-MDPC McEliece attracted significant attention as promising alternative public-key encryption scheme believed to be resistant against quantum computing attacks. Compared to binary Goppa codes, it achieves practical key sizes and was shown to perform well on constrained platforms such as embedded microcontrollers and FPGAs. However, so far none of the published QC-MDPC McEliece/Niederreiter im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inform. and Commun. Convergence Engineering

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2010