Random key predistribution schemes for sensor networks
read more
Citations
TinySec: a link layer security architecture for wireless sensor networks
The Sybil attack in sensor networks: analysis & defenses
Establishing pairwise keys in distributed sensor networks
A pairwise key pre-distribution scheme for wireless sensor networks
A pairwise key predistribution scheme for wireless sensor networks
References
New Directions in Cryptography
A method for obtaining digital signatures and public-key cryptosystems
The Sybil Attack
A key-management scheme for distributed sensor networks
Security for Sensor Networks
Related Papers (5)
Frequently Asked Questions (16)
Q2. Why is distributed node revocation used?
Distributed node revocation is best used as a fast-reaction system to respond to perceived node-capture attacks, rather than as a full counter-measure against a malicious node that has already entered the network.
Q3. What is the theoretical number of nodes an attacker can revoke per successful node?
If resistance against node replication is implemented, then the theoretical number of nodes an attacker can revoke per successful node captured is dmaxt which is kd where k is a small constant.
Q4. What scheme can be used to ensure that the network remains fully secure?
the authors propose the random-pairwise keys scheme, which assures that, even when some number of nodes have been compromised, the remainder of the network remains fully secure.
Q5. What is the probability of any two nodes sharing at least q keys?
If the key pool size is too large, then the probability of any two nodes sharing at least q keys would be less than p, and the network may not be connected after bootstrapping is complete.
Q6. How does the probability of eavesdropping increase with the length of the path?
for any given path, the probability that the adversary can eavesdrop on the path increases with the length of the path since if any one link on the path is insecure then the entire path is made insecure.
Q7. What is the trade-off for multipath key reinforcement?
The trade-off for this benefit in the q-composite case is a smaller key pool size; the tradeoff for the multipath key reinforcement scheme is increased network overhead.
Q8. What is the probability that a node is used?
For any of the m keys in a node’s key ring, the probability that it is used is the probability that the other node which has this key is within communication radius.
Q9. How many hops does the rebroadcast extend the range of the node?
Each hop that the node ID is rebroadcast effectively extends the range by approximately one communication radius, increasing the number of nodes that can hear the broadcast by a squared factor.
Q10. How can a network be resistant to a revocation attack?
In the event that node capture goes undetected by the network, it is desirable that the network be resistant against the addition of infiltrator nodes derived from captured nodes, especially considering that resistance may be required to prevent revocation attack on the network (see Section 7.1.3)To limit the amount node replication possible on the network, the degree of any node can be limited.
Q11. What is the probability of a graph being connected with a high probability c?
it is possible to calculate some expected degree d for the vertices in the graph such that the graph is connected with some high probability c, where c = 0.999, for example.
Q12. What is the probability of any two nodes being able to communicate securely?
Recall that the size of each node’s key rings is m keys, and the probability of any two nodes being able to communicate securely is p.
Q13. What are some of the problems that may be solved by deploying sensors?
Networks of thousands of sensors may present an economical solution to some of their challenging problems: real-time traffic monitoring, building safety monitoring (structural, fire, and physical security monitoring), military sensing and tracking, distributed measurement of seismic activity, real-time pollution monitoring, wildlife monitoring, wildfire tracking, etc.
Q14. How many neighbors are expected to be able to establish a secure link?
The probability of any two nodes being able to establish a secure link is set at p = 0.33, and the deployment density is set such that the expected number of neighbors of each node was 60.
Q15. how many nodes can an attacker eavesdrop on indirectly?
In this section the authors evaluate how the q-composite scheme improves a sensor network’s resilience in the face of a node capture attack by calculating the fraction of links in the network that an attacker is able to eavesdrop on indirectly as a result of recovering keys from captured nodes.
Q16. How many neighbors are required to be able to eavesdrop on a link?
In general, if a link is reinforced by k common neighbors, then the adversary must be able to eavesdrop on that link, as well as at least one link on each of the k 2-hop paths.