Resisting node spoofing attacks in random key predistribution schemes: a uniform design

  • Authors:
  • Kevin Chan;Faramarz Fekri

  • Affiliations:
  • School ofElectrical and Computer Engineering, Georgia Institute of Technology;School ofElectrical and Computer Engineering, Georgia Institute of Technology

  • Venue:
  • SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Current key predistribution schemes for wireless sensor networks derive the merit of their performance based on the resilience of secure communication links to node-compromise attacks. As an adversarial entity gathers key information, it is able to mount attacks by spoofing or eavesdropping on networked communications with growing success. A powerful variety of attack is possible with a spoofed node, which is when the adversary is able to present itself as a legitimate identity in the network and not be detected. This work considers the security of wireless sensor networks with a priority on node-spoofing attacks. We propose node-spoofing attack models to classify various adversarial capabilities. We then propose two new key predistribution techniques as variants to random key predistribution, which provide improved resilience to node-spoofing attacks.