On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly...
Gespeichert in:
Veröffentlicht in: | KSII transactions on Internet and information systems 2009-08, Vol.3 (4), p.376-384 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | kor |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 384 |
---|---|
container_issue | 4 |
container_start_page | 376 |
container_title | KSII transactions on Internet and information systems |
container_volume | 3 |
creator | Mohaisen, Abedelaziz Choi, Jeong-Woon Hong, Do-Won |
description | In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise. |
format | Article |
fullrecord | <record><control><sourceid>kiss_kisti</sourceid><recordid>TN_cdi_kisti_ndsl_JAKO200932056741138</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><kiss_id>3532383</kiss_id><sourcerecordid>3532383</sourcerecordid><originalsourceid>FETCH-LOGICAL-k508-393679d435f4dcf3ef714734f90412423afbb2ef8155bcfa9e0d5844679dca833</originalsourceid><addsrcrecordid>eNpNjF1LwzAYhYsoOOZ-gTe58bKQ5E2a9LIMP-aGAx14Wdr0DQtbW8mbIf33ThTx6jxwnnMuspkoTZEbaczlP77OFkSh5UJaWShrZ9nrdmBpj2w1ELpTDGlio2cVTX2PKQbH1jjlbUPYsSq6fUjo0ikiCwN7DxGPSMTecKAxshdMn2M80E125Zsj4eI359nu4X63fMo328fVstrkB81tDiUUpuwUaK865wG9EcqA8iVXQioJjW9bid4KrVvnmxJ5p61S3yPXWIB5dvdzewiUQj10dKyfq_VWcl6C5LowSgiwZ-_2z6P6I4a-iVMNGuS5hC9gbFUQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Mohaisen, Abedelaziz ; Choi, Jeong-Woon ; Hong, Do-Won</creator><creatorcontrib>Mohaisen, Abedelaziz ; Choi, Jeong-Woon ; Hong, Do-Won</creatorcontrib><description>In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.</description><identifier>ISSN: 1976-7277</identifier><identifier>EISSN: 1976-7277</identifier><language>kor</language><publisher>한국인터넷정보학회</publisher><subject>key management ; security analysis ; security architecture ; Wireless sensor neworks</subject><ispartof>KSII transactions on Internet and information systems, 2009-08, Vol.3 (4), p.376-384</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,776,780,881</link.rule.ids></links><search><creatorcontrib>Mohaisen, Abedelaziz</creatorcontrib><creatorcontrib>Choi, Jeong-Woon</creatorcontrib><creatorcontrib>Hong, Do-Won</creatorcontrib><title>On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks</title><title>KSII transactions on Internet and information systems</title><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><description>In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.</description><subject>key management</subject><subject>security analysis</subject><subject>security architecture</subject><subject>Wireless sensor neworks</subject><issn>1976-7277</issn><issn>1976-7277</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>JDI</sourceid><recordid>eNpNjF1LwzAYhYsoOOZ-gTe58bKQ5E2a9LIMP-aGAx14Wdr0DQtbW8mbIf33ThTx6jxwnnMuspkoTZEbaczlP77OFkSh5UJaWShrZ9nrdmBpj2w1ELpTDGlio2cVTX2PKQbH1jjlbUPYsSq6fUjo0ikiCwN7DxGPSMTecKAxshdMn2M80E125Zsj4eI359nu4X63fMo328fVstrkB81tDiUUpuwUaK865wG9EcqA8iVXQioJjW9bid4KrVvnmxJ5p61S3yPXWIB5dvdzewiUQj10dKyfq_VWcl6C5LowSgiwZ-_2z6P6I4a-iVMNGuS5hC9gbFUQ</recordid><startdate>20090831</startdate><enddate>20090831</enddate><creator>Mohaisen, Abedelaziz</creator><creator>Choi, Jeong-Woon</creator><creator>Hong, Do-Won</creator><general>한국인터넷정보학회</general><scope>HZB</scope><scope>Q5X</scope><scope>JDI</scope></search><sort><creationdate>20090831</creationdate><title>On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks</title><author>Mohaisen, Abedelaziz ; Choi, Jeong-Woon ; Hong, Do-Won</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-k508-393679d435f4dcf3ef714734f90412423afbb2ef8155bcfa9e0d5844679dca833</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>kor</language><creationdate>2009</creationdate><topic>key management</topic><topic>security analysis</topic><topic>security architecture</topic><topic>Wireless sensor neworks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mohaisen, Abedelaziz</creatorcontrib><creatorcontrib>Choi, Jeong-Woon</creatorcontrib><creatorcontrib>Hong, Do-Won</creatorcontrib><collection>Korean Studies Information Service System (KISS)</collection><collection>Korean Studies Information Service System (KISS) B-Type</collection><collection>KoreaScience</collection><jtitle>KSII transactions on Internet and information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mohaisen, Abedelaziz</au><au>Choi, Jeong-Woon</au><au>Hong, Do-Won</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks</atitle><jtitle>KSII transactions on Internet and information systems</jtitle><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><date>2009-08-31</date><risdate>2009</risdate><volume>3</volume><issue>4</issue><spage>376</spage><epage>384</epage><pages>376-384</pages><issn>1976-7277</issn><eissn>1976-7277</eissn><abstract>In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.</abstract><pub>한국인터넷정보학회</pub><tpages>9</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1976-7277 |
ispartof | KSII transactions on Internet and information systems, 2009-08, Vol.3 (4), p.376-384 |
issn | 1976-7277 1976-7277 |
language | kor |
recordid | cdi_kisti_ndsl_JAKO200932056741138 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | key management security analysis security architecture Wireless sensor neworks |
title | On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T07%3A42%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kiss_kisti&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20Insecurity%20of%20Asymmetric%20Key-based%20Architecture%20in%20Wireless%20Sensor%20Networks&rft.jtitle=KSII%20transactions%20on%20Internet%20and%20information%20systems&rft.au=Mohaisen,%20Abedelaziz&rft.date=2009-08-31&rft.volume=3&rft.issue=4&rft.spage=376&rft.epage=384&rft.pages=376-384&rft.issn=1976-7277&rft.eissn=1976-7277&rft_id=info:doi/&rft_dat=%3Ckiss_kisti%3E3532383%3C/kiss_kisti%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_kiss_id=3532383&rfr_iscdi=true |