Mitigating sandwich attacks against a secure key management scheme in wireless sensor networks for PCS/SCADA


Autoria(s): Alzaid, Hani; Park, Dong-Gook; Gonzalez Nieto, Juan M.; Foo, Ernest
Data(s)

01/04/2010

Resumo

Alzaid et al. proposed a forward & backward secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems. The scheme, however, is still vulnerable to an attack called the sandwich attack that can be launched when the adversary captures two sensor nodes at times t1 and t2, and then reveals all the group keys used between times t1 and t2. In this paper, a fix to the scheme is proposed in order to limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched. Then, the performance analysis for our proposal, Alzaid et al.’s scheme, and Nilsson et al.’s scheme is given.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/32118/

Publicador

IEEE

Relação

http://eprints.qut.edu.au/32118/1/c32118.pdf

http://www.aina2010.curtin.edu.au/

Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., & Foo, Ernest (2010) Mitigating sandwich attacks against a secure key management scheme in wireless sensor networks for PCS/SCADA. In Proceedings of The 24th International Conference on Advanced Information Networking and Applications, IEEE, Perth, Western Australia.

Direitos

Copyright 2010 the Authors and IEEE

Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Fonte

Computer Science; Faculty of Science and Technology; Information Security Institute

Palavras-Chave #100510 Wireless Communications #sandwich attack #node #supervisory control and data acquisition #key management #process control systems #forward and backward secrecy #wireless sensor network
Tipo

Conference Paper