A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs

Security is a critical and vital task in wireless sensor networks, therefore different key management systems have been proposed, many of which are based on symmetric cryptography. Such systems are very energy efficient, but they lack some other desirable characteristics. On the other hand, systems based on public key cryptography have those desirable characteristics, but they consume more energy. Recently based on authenticated messages from base station a new PKC based key agreement protocol was proposed. We show this method is susceptible to a form of denial of service attack where resources of the network can be exhausted with bogus messages. Then, we propose two different improvements to solve this vulnerability. Simulation results show that these new protocols retain desirable characteristics of the basic method and solve its deficiencies.

[1]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[2]  Bülent Yener,et al.  Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.

[3]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[4]  Ashok Kumar Das,et al.  A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..

[5]  J. Antonio García-Macías,et al.  Deploying a voice capture sensor network system for a secure ubiquitous home environment , 2009, Int. J. Commun. Syst..

[6]  Daehee Kim,et al.  PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks , 2016, IEEE Sensors Journal.

[7]  Wenfen Liu,et al.  Two-factor authentication scheme using attribute and password , 2017, Int. J. Commun. Syst..

[8]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.

[9]  Peng Ning,et al.  Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.

[10]  Wenjing Lou,et al.  Multi-User Broadcast Authentication in Wireless Sensor Networks , 2009 .

[11]  W. Han Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, IACR Cryptol. ePrint Arch..

[12]  Mohsen Guizani,et al.  PKC Based Broadcast Authentication using Signature Amortization for WSNs , 2012, IEEE Transactions on Wireless Communications.

[13]  Hsin-Wen Wei,et al.  A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.

[14]  Alfred Menezes,et al.  Handbook Of Applied Cryptography Crc Press , 2015 .

[15]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[16]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[17]  Michael Mitzenmacher,et al.  Compressed bloom filters , 2001, PODC '01.

[18]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.

[19]  Mohammad S. Obaidat,et al.  WHOMoVeS: An optimized broadband sensor network for military vehicle tracking , 2008, Int. J. Commun. Syst..

[20]  Bin Zhao,et al.  IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks , 2008, Comput. Commun..

[21]  Wenjing Lou,et al.  Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[22]  Hao Chen,et al.  An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring , 2013, Ad Hoc Networks.

[23]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2007 .

[24]  Hsiao-Hwa Chen,et al.  Selecting key management schemes for WSN applications , 2012, Comput. Secur..

[25]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[26]  Bruce Schneier,et al.  Analysis of the SSL 3.0 protocol , 1996 .

[27]  Srivaths Ravi,et al.  Analyzing the energy consumption of security protocols , 2003, ISLPED '03.

[28]  Mohammad S. Obaidat,et al.  UCGNet: wireless sensor network-based active aquifer contamination monitoring and control system for underground coal gasification , 2017, Int. J. Commun. Syst..

[29]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[30]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[31]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[32]  Pawel Kulakowski,et al.  Performance study of wireless sensor and actuator networks in forest fire scenarios , 2013, Int. J. Commun. Syst..

[33]  Kyung-Ah Shim,et al.  EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.

[34]  Mohammad Reza Aref,et al.  A novel and low-energy PKC-based key agreement protocol for WSNs , 2013, 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC).

[35]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[36]  Yacine Challal,et al.  A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.

[37]  Yacine Challal,et al.  A new class of Hash-Chain based key pre-distribution schemes for WSN , 2013, Comput. Commun..

[38]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[39]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[40]  Min Jou,et al.  Ubiquitous tutoring in laboratories based on wireless sensor networks , 2013, Comput. Hum. Behav..

[41]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[42]  A Ajeena,et al.  Two Factor user Authentication in Wireless Sensor Networks , 2018 .

[43]  Anandarup Mukherjee,et al.  Design and implementation analysis of a public key infrastructure-enabled security framework for ZigBee sensor networks , 2016, Int. J. Commun. Syst..

[44]  Elaine Shi,et al.  Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[45]  Chae Hoon Lim Secure Code Dissemination and Remote Image Management Using Short-Lived Signatures in WSNs , 2011, IEEE Communications Letters.

[46]  Mohammad Reza Aref,et al.  Toward an energy efficient PKC-based key management system for wireless sensor networks , 2014, ISC Int. J. Inf. Secur..

[47]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.