Random Key Pre-Distribution Techniques against Sybil Attacks

نویسندگان

چکیده مقاله:

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obtained by captured benign nodes. Existing Sybil defensive mechanisms suffer from the restricted sensor network size, or cause excessive resource consumption for the sensor network. In this work we propose a Sybil node detection mechanism, based on Random Key Distribution (RKD) schemes that can cope with large network sizes and minimize the waste of resources. We explain the techniques each node can use in a network running q-composite RKD to detect Sybil identities and restrict their number. Our method requires no trust to other sensors, which is important to defend against the attack.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

random key pre-distribution techniques against sybil attacks

sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...

متن کامل

Defending Against Sybil Attacks in Sensor Networks using Pre-Distributed key

A wireless sensor network is a collaborative network in which nodes perform their sensing task in one hand, and function as relay for transferring the data of other nodes on the other hand if necessary. It consists of many inexpensive wireless nodes, each having sensing capability with some computational and communication power. As sensor networks are coming to be of wide-spread deployment, sec...

متن کامل

Random Key Pre-distribution Scheme Based on Key Updating

A random key pre-distribution scheme based on key updating (RKKU) was proposed, which is effective in wireless sensor networks. Firstly, the base station will randomly distribute some keys, a hash function and some code slices to each node. Furthermore, the RKKU scheme compares with the information of some random key to find the same key, and computes the communication key between two sensor no...

متن کامل

An Efficient Key Pre - distribution Scheme for Multiple Attacks

Probabilistic Key pre-distribution schemes (P-KPSs) are candidates for securing interactions between resource limited computer networks. Collusion susceptible P-KPSs are trade-offs between security and complexity and security include resistance to passive eavesdropping attacks, and active message injection attacks. The existing work presented the P-KPS, the subset keys and identity tickets (SKI...

متن کامل

An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks

Key establishment in sensor networks is a challenging problem because of resource constraints of the sensors. The classical public-key routines are impractical in most sensor network architectures. In this paper, we propose a new random key pre-distribution scheme which is based on the identity-based approach for key establishment between two neighbor nodes in wireless sensor networks. Our prop...

متن کامل

Security against individual attacks for realistic quantum key distribution

The first complete protocol for quantum key distribution (qkd) has been introduced by Bennett and Brassard in 1984 [1] following earlier ideas by Wiesner [2]. Since then, this protocol (BB84 for short) has been implemented by several groups [3–13]. For an overview containing more details about the background, the experimental implementation and the classical evaluation procedure see for example...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 5  شماره 1

صفحات  1- 13

تاریخ انتشار 2016-06-01

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023