Attack Wireless Sensor Network Using Compromised Key Redistribution

Wireless sensor networks have been widely used in many areas, such as earthquake monitoring, building structure monitoring, and military surveillance. In this work, we focus on the wireless sensor network deployed in the battlefield, using random key predistribution scheme. Based on the node cloning...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Applied Mechanics and Materials 2013-01, Vol.263-266, p.920-925
Hauptverfasser: Chen, Cheng Yeh, Hsu, Te Cheng, Yein, Alan Dahgwo, Hsieh, Wen Shyong, Lin, Jiun An
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Wireless sensor networks have been widely used in many areas, such as earthquake monitoring, building structure monitoring, and military surveillance. In this work, we focus on the wireless sensor network deployed in the battlefield, using random key predistribution scheme. Based on the node cloning attack, we proposed a new attack scheme, called compromised key redistribution attack, and discussed related attack scenarios. Furthermore, we have exposed that, when the overlapping factor of compromised key set is larger than 0.05, it is almost 90% that the number of distinct compromised keys is 10.5% of the original key pool. This result helps the adversary estimate the approximated size of original key pool by calculating the overlapping factor, thus calculate the probability that malicious nodes successfully establish malicious connections with legitimate nodes.
ISSN:1660-9336
1662-7482
1662-7482
DOI:10.4028/www.scientific.net/AMM.263-266.920