{"title":"A resilient and seamless rekeying scheme based on random key distribution for WSN","authors":"Priyanka Ahlawat, M. Dave","doi":"10.1109/COMPTELIX.2017.8003987","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked from the network by means of rekeying. We aim to optimize the problem of key revocation and rekeying by reducing the communication and computation overhead. An attack algorithm is presented from an adversarial view point, compromising of capturing cost and traveling cost. It is used to compute the destructive rank of each node which ultimately finds the set of vulnerable nodes of the network. Each communicating node determine a backup key for future node revocation and automatically switches to it, to avoid the reconfiguration of the shared key. The keys of vulnerable nodes are bypassed during the generation of the backup link keys. It is shown that proposed scheme has high level of security as well as reduced communication overhead during rekeying process. The proposed attack is also compared with random attack and found that it is improved in terms of route compromise ratio and energy cost.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"35 1","pages":"321-327"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPTELIX.2017.8003987","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked from the network by means of rekeying. We aim to optimize the problem of key revocation and rekeying by reducing the communication and computation overhead. An attack algorithm is presented from an adversarial view point, compromising of capturing cost and traveling cost. It is used to compute the destructive rank of each node which ultimately finds the set of vulnerable nodes of the network. Each communicating node determine a backup key for future node revocation and automatically switches to it, to avoid the reconfiguration of the shared key. The keys of vulnerable nodes are bypassed during the generation of the backup link keys. It is shown that proposed scheme has high level of security as well as reduced communication overhead during rekeying process. The proposed attack is also compared with random attack and found that it is improved in terms of route compromise ratio and energy cost.