Advertisement

Wireless Threats and Key Management Issues

Chapter
Part of the SpringerBriefs in Electrical and Computer Engineering book series (BRIEFSELECTRIC)

Abstract

Secure routing in wireless sensor networks and secure key management for mobility in non-cellular wireless and mobile networks are discussed in the light of threats that have to be addressed by networks connected to the mobile Internet. Current solutions involve large computation and communication overhead in the calculation of trust levels, expected outcomes or behaviors, and key handovers which compromise confidentiality and availability. These problems further motivate the need for a more efficient and flexible trust model that reflects human social interaction. A virtue-based trust model can be used to support the cooperation and collaboration required between network nodes in local information sharing schemes to securely route packets and distribute secret keys to target networks. In addition to protecting source and location confidentiality, such schemes can help ensure availability through energy-efficient information diffusion techniques.

Keywords

Sensor Node Mobile Node Mobile Terminal Unknown Node Target Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Kisner RA et al (2010) Cybersecurity through real-time distributed control systems. Oak Ridge National Laboratory, ORNL/TM-2010/30, pp 1–14Google Scholar
  2. 2.
    Vasilache RA et al (2013) Comparative evaluation of trust mechanisms for wireless sensor networks. In: 11th RoEduNet international conference, Sinaia, Romania, 17–19 Jan 2013, pp 1–5Google Scholar
  3. 3.
    Barker E et al (2013) A framework for designing cryptographic key management systems. NIST, Special Publication 800–130. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-130.pdf. Accessed 15 Jul 2014
  4. 4.
    Barker E et al (2012) Recommendations for key management. NIST, Special Publication 800–57, Part 1, rev 3. http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf. Accessed 15 Jul 2014
  5. 5.
    Bergstra J, Burgess M (2009) Local and global trust based on the concept of promises. Computing Research Repository (CORR), paper 0912.4637. http://arxiv.org/pdf/0912.4637.pdf. Accessed 15 Jul 2014
  6. 6.
    Hoeper K et al (2008) Security challenges in seamless mobility–how to ‘handover’ the keys? In: 4th international ACM wireless internet conference (WICON ’08), Maui, HI, 17–19 Nov 2008, pp 2–3Google Scholar
  7. 7.
    Chen L, Gong G (2012) Wireless security: security for mobility. In: Communication system security. CRC Press, New YorkGoogle Scholar
  8. 8.
    Forsberg D et al (2013) LTE security, Chap 2, 2nd edn. Wiley, HobokenGoogle Scholar
  9. 9.
    Kishiyama Y et al (2013) Future steps of LTE-A: evolution toward integration of local area and wide area systems. IEEE Wirel Commun 20(1):12–18. doi: 10.1109/MWC.2013.6472194 CrossRefGoogle Scholar
  10. 10.
    Zugenmaier A, Aono H (2013) Security technology for SAE/LTE (system architecture evolution 2/LTE). NTT DOCOMO Tech J 11(3):28–30. http://www.nttdocomo.co.jp/english/binary/pdf/corporate/technology/rd/technical_journal/bn/vol11_3/vol11_3_027en.pdf. Accessed 15 Jul 2014
  11. 11.
    Di Pietro R, Guarino S (2013) Confidentiality and availability issues in mobile unattended wireless sensor networks. In: 14th IEEE international symposium and workshops on a world of wireless, mobile and multimedia networks (WoWMoM), Madrid, Spain, 4–7 Jun 2013, pp 1–6Google Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  1. 1.Johns Hopkins UniversityPittsburghUSA

Personalised recommendations