Proceedings of the First ACM Conference on Wireless Network Security 2008
DOI: 10.1145/1352533.1352550
|View full text |Cite
|
Sign up to set email alerts
|

Key management and secure software updates in wireless process control environments

Abstract: Process control systems using wireless sensor nodes are large and complex environments built to last for a long time. Cryptographic keys are typically preloaded in the wireless nodes prior to deployment and used for the rest of their lifetime. To reduce the risk of successful cryptanalysis, new keys must be established (rekeying). We have designed a rekeying scheme that provides both backward and forward secrecy.Furthermore, since these nodes are used for extensive periods of time, there is a need to update th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 14 publications
(14 reference statements)
0
7
0
Order By: Relevance
“…Nilsson et al [5] presented asymmetric key management for the wireless process control environment. In their design, they proposed a key changing methodology of sensor nodes after a certain period of time.…”
Section: Relatate Workmentioning
confidence: 99%
“…Nilsson et al [5] presented asymmetric key management for the wireless process control environment. In their design, they proposed a key changing methodology of sensor nodes after a certain period of time.…”
Section: Relatate Workmentioning
confidence: 99%
“…Finally, although WirelessHART offers different mechanisms to prolong the lifetime of sensor nodes (e.g. synchronization for the transmission), it does not guarantee the updating of security credentials during that time period [12], which may be a risk to the security of the system.…”
Section: Wirelesshartmentioning
confidence: 99%
“…In this section, we analyze the performance of our proposal, Alzaid et al's scheme [3], and the similar scheme proposed by Nilsson et al [15]. Our performance analysis covers memory overhead, communication cost, and computation cost for these schemes.…”
Section: Performance Analysismentioning
confidence: 99%
“…Nilsson et al [15] proposed a key management scheme for WSN applications in PCS/SCADA environments [4,7,14,16], which was incorrectly claimed to provide future and past key secrecy. Nilsson et al's scheme uses key transport, not key agreement, where the new pairwise key is determined solely by the sensor node.…”
Section: Introductionmentioning
confidence: 99%