On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly...
Gespeichert in:
Veröffentlicht in: | KSII transactions on Internet and information systems 2009-08, Vol.3 (4), p.376-384 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | kor |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise. |
---|---|
ISSN: | 1976-7277 1976-7277 |