On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks

In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:KSII transactions on Internet and information systems 2009-08, Vol.3 (4), p.376-384
Hauptverfasser: Mohaisen, Abedelaziz, Choi, Jeong-Woon, Hong, Do-Won
Format: Artikel
Sprache:kor
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 384
container_issue 4
container_start_page 376
container_title KSII transactions on Internet and information systems
container_volume 3
creator Mohaisen, Abedelaziz
Choi, Jeong-Woon
Hong, Do-Won
description In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.
format Article
fullrecord <record><control><sourceid>kiss_kisti</sourceid><recordid>TN_cdi_kisti_ndsl_JAKO200932056741138</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><kiss_id>3532383</kiss_id><sourcerecordid>3532383</sourcerecordid><originalsourceid>FETCH-LOGICAL-k508-393679d435f4dcf3ef714734f90412423afbb2ef8155bcfa9e0d5844679dca833</originalsourceid><addsrcrecordid>eNpNjF1LwzAYhYsoOOZ-gTe58bKQ5E2a9LIMP-aGAx14Wdr0DQtbW8mbIf33ThTx6jxwnnMuspkoTZEbaczlP77OFkSh5UJaWShrZ9nrdmBpj2w1ELpTDGlio2cVTX2PKQbH1jjlbUPYsSq6fUjo0ikiCwN7DxGPSMTecKAxshdMn2M80E125Zsj4eI359nu4X63fMo328fVstrkB81tDiUUpuwUaK865wG9EcqA8iVXQioJjW9bid4KrVvnmxJ5p61S3yPXWIB5dvdzewiUQj10dKyfq_VWcl6C5LowSgiwZ-_2z6P6I4a-iVMNGuS5hC9gbFUQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Mohaisen, Abedelaziz ; Choi, Jeong-Woon ; Hong, Do-Won</creator><creatorcontrib>Mohaisen, Abedelaziz ; Choi, Jeong-Woon ; Hong, Do-Won</creatorcontrib><description>In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.</description><identifier>ISSN: 1976-7277</identifier><identifier>EISSN: 1976-7277</identifier><language>kor</language><publisher>한국인터넷정보학회</publisher><subject>key management ; security analysis ; security architecture ; Wireless sensor neworks</subject><ispartof>KSII transactions on Internet and information systems, 2009-08, Vol.3 (4), p.376-384</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,776,780,881</link.rule.ids></links><search><creatorcontrib>Mohaisen, Abedelaziz</creatorcontrib><creatorcontrib>Choi, Jeong-Woon</creatorcontrib><creatorcontrib>Hong, Do-Won</creatorcontrib><title>On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks</title><title>KSII transactions on Internet and information systems</title><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><description>In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.</description><subject>key management</subject><subject>security analysis</subject><subject>security architecture</subject><subject>Wireless sensor neworks</subject><issn>1976-7277</issn><issn>1976-7277</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>JDI</sourceid><recordid>eNpNjF1LwzAYhYsoOOZ-gTe58bKQ5E2a9LIMP-aGAx14Wdr0DQtbW8mbIf33ThTx6jxwnnMuspkoTZEbaczlP77OFkSh5UJaWShrZ9nrdmBpj2w1ELpTDGlio2cVTX2PKQbH1jjlbUPYsSq6fUjo0ikiCwN7DxGPSMTecKAxshdMn2M80E125Zsj4eI359nu4X63fMo328fVstrkB81tDiUUpuwUaK865wG9EcqA8iVXQioJjW9bid4KrVvnmxJ5p61S3yPXWIB5dvdzewiUQj10dKyfq_VWcl6C5LowSgiwZ-_2z6P6I4a-iVMNGuS5hC9gbFUQ</recordid><startdate>20090831</startdate><enddate>20090831</enddate><creator>Mohaisen, Abedelaziz</creator><creator>Choi, Jeong-Woon</creator><creator>Hong, Do-Won</creator><general>한국인터넷정보학회</general><scope>HZB</scope><scope>Q5X</scope><scope>JDI</scope></search><sort><creationdate>20090831</creationdate><title>On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks</title><author>Mohaisen, Abedelaziz ; Choi, Jeong-Woon ; Hong, Do-Won</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-k508-393679d435f4dcf3ef714734f90412423afbb2ef8155bcfa9e0d5844679dca833</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>kor</language><creationdate>2009</creationdate><topic>key management</topic><topic>security analysis</topic><topic>security architecture</topic><topic>Wireless sensor neworks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mohaisen, Abedelaziz</creatorcontrib><creatorcontrib>Choi, Jeong-Woon</creatorcontrib><creatorcontrib>Hong, Do-Won</creatorcontrib><collection>Korean Studies Information Service System (KISS)</collection><collection>Korean Studies Information Service System (KISS) B-Type</collection><collection>KoreaScience</collection><jtitle>KSII transactions on Internet and information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mohaisen, Abedelaziz</au><au>Choi, Jeong-Woon</au><au>Hong, Do-Won</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks</atitle><jtitle>KSII transactions on Internet and information systems</jtitle><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><date>2009-08-31</date><risdate>2009</risdate><volume>3</volume><issue>4</issue><spage>376</spage><epage>384</epage><pages>376-384</pages><issn>1976-7277</issn><eissn>1976-7277</eissn><abstract>In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.</abstract><pub>한국인터넷정보학회</pub><tpages>9</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1976-7277
ispartof KSII transactions on Internet and information systems, 2009-08, Vol.3 (4), p.376-384
issn 1976-7277
1976-7277
language kor
recordid cdi_kisti_ndsl_JAKO200932056741138
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects key management
security analysis
security architecture
Wireless sensor neworks
title On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T07%3A42%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kiss_kisti&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20Insecurity%20of%20Asymmetric%20Key-based%20Architecture%20in%20Wireless%20Sensor%20Networks&rft.jtitle=KSII%20transactions%20on%20Internet%20and%20information%20systems&rft.au=Mohaisen,%20Abedelaziz&rft.date=2009-08-31&rft.volume=3&rft.issue=4&rft.spage=376&rft.epage=384&rft.pages=376-384&rft.issn=1976-7277&rft.eissn=1976-7277&rft_id=info:doi/&rft_dat=%3Ckiss_kisti%3E3532383%3C/kiss_kisti%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_kiss_id=3532383&rfr_iscdi=true