2011
DOI: 10.1002/sec.106
|View full text |Cite
|
Sign up to set email alerts
|

Combating key‐swapping collusion attack on random pairwise key pre‐distribution schemes for wireless sensor networks

Abstract: Random pairwise key pre-distribution schemes have been adopted extensively as a preferred approach to tackling the pairwise key agreement problem in wireless sensor networks (WSNs). However, their practical applicability is threatened by the key-swapping collusion attack (KSCA) whose goal is to ruin critical applications that requires collaborative efforts of sensor nodes such as data aggregation mechanisms, routing protocols, distributed voting schemes and misbehaviour detection systems, etc. In this paper, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…In general, our previous contributions [25] [26] are motivated by the problem that most PKE schemes, if not all, for DSNs are susceptible to KSCA if the cryptographic secrets are not discarded after their first use in the key establishment process among neighboring sensor nodes. This problem can be solved if the cryptographic secrets are discarded after the first use.…”
Section: Limitations Of Our Prior Contributionsmentioning
confidence: 99%
See 4 more Smart Citations
“…In general, our previous contributions [25] [26] are motivated by the problem that most PKE schemes, if not all, for DSNs are susceptible to KSCA if the cryptographic secrets are not discarded after their first use in the key establishment process among neighboring sensor nodes. This problem can be solved if the cryptographic secrets are discarded after the first use.…”
Section: Limitations Of Our Prior Contributionsmentioning
confidence: 99%
“…Once the attacker compromises these nodes, she can read out all information stored in their memories and then reprogram to obtain the full control of the nodes. Furthermore, we accept the common assumptions about the node compromise model mentioned in [21,25,26,[28][29][30] that:…”
Section: B Threat Assumptionsmentioning
confidence: 99%
See 3 more Smart Citations