random key pre-distribution techniques against sybil attacks

Authors

mohammad ehdaie

parsa sharif research center nikolaos alexiou

kth panos papadimitratos

kth

abstract

sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obtained by captured benign nodes. existingsybil defensive mechanisms suffer from the restricted sensor network size, or cause excessive resource consumption for the sensor network. in this work we propose a sybil node detection mechanism, based on random key distribution (rkd) schemes that can cope with large network sizes and minimize the waste of resources. our method requires no trust to other sensors, which is important to defend against the attack.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

full text

Defending Against Sybil Attacks in Sensor Networks using Pre-Distributed key

A wireless sensor network is a collaborative network in which nodes perform their sensing task in one hand, and function as relay for transferring the data of other nodes on the other hand if necessary. It consists of many inexpensive wireless nodes, each having sensing capability with some computational and communication power. As sensor networks are coming to be of wide-spread deployment, sec...

full text

Random Key Pre-distribution Scheme Based on Key Updating

A random key pre-distribution scheme based on key updating (RKKU) was proposed, which is effective in wireless sensor networks. Firstly, the base station will randomly distribute some keys, a hash function and some code slices to each node. Furthermore, the RKKU scheme compares with the information of some random key to find the same key, and computes the communication key between two sensor no...

full text

An Efficient Key Pre - distribution Scheme for Multiple Attacks

Probabilistic Key pre-distribution schemes (P-KPSs) are candidates for securing interactions between resource limited computer networks. Collusion susceptible P-KPSs are trade-offs between security and complexity and security include resistance to passive eavesdropping attacks, and active message injection attacks. The existing work presented the P-KPS, the subset keys and identity tickets (SKI...

full text

An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks

Key establishment in sensor networks is a challenging problem because of resource constraints of the sensors. The classical public-key routines are impractical in most sensor network architectures. In this paper, we propose a new random key pre-distribution scheme which is based on the identity-based approach for key establishment between two neighbor nodes in wireless sensor networks. Our prop...

full text

Security against individual attacks for realistic quantum key distribution

The first complete protocol for quantum key distribution (qkd) has been introduced by Bennett and Brassard in 1984 [1] following earlier ideas by Wiesner [2]. Since then, this protocol (BB84 for short) has been implemented by several groups [3–13]. For an overview containing more details about the background, the experimental implementation and the classical evaluation procedure see for example...

full text

My Resources

Save resource for easier access later


Journal title:
journal of communication engineering

جلد ۵، شماره ۱، صفحات ۱-۱۳

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023