Abstract
Secure routing in wireless sensor networks and secure key management for mobility in non-cellular wireless and mobile networks are discussed in the light of threats that have to be addressed by networks connected to the mobile Internet. Current solutions involve large computation and communication overhead in the calculation of trust levels, expected outcomes or behaviors, and key handovers which compromise confidentiality and availability. These problems further motivate the need for a more efficient and flexible trust model that reflects human social interaction. A virtue-based trust model can be used to support the cooperation and collaboration required between network nodes in local information sharing schemes to securely route packets and distribute secret keys to target networks. In addition to protecting source and location confidentiality, such schemes can help ensure availability through energy-efficient information diffusion techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kisner RA et al (2010) Cybersecurity through real-time distributed control systems. Oak Ridge National Laboratory, ORNL/TM-2010/30, pp 1–14
Vasilache RA et al (2013) Comparative evaluation of trust mechanisms for wireless sensor networks. In: 11th RoEduNet international conference, Sinaia, Romania, 17–19 Jan 2013, pp 1–5
Barker E et al (2013) A framework for designing cryptographic key management systems. NIST, Special Publication 800–130. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-130.pdf. Accessed 15 Jul 2014
Barker E et al (2012) Recommendations for key management. NIST, Special Publication 800–57, Part 1, rev 3. http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf. Accessed 15 Jul 2014
Bergstra J, Burgess M (2009) Local and global trust based on the concept of promises. Computing Research Repository (CORR), paper 0912.4637. http://arxiv.org/pdf/0912.4637.pdf. Accessed 15 Jul 2014
Hoeper K et al (2008) Security challenges in seamless mobility–how to ‘handover’ the keys? In: 4th international ACM wireless internet conference (WICON ’08), Maui, HI, 17–19 Nov 2008, pp 2–3
Chen L, Gong G (2012) Wireless security: security for mobility. In: Communication system security. CRC Press, New York
Forsberg D et al (2013) LTE security, Chap 2, 2nd edn. Wiley, Hoboken
Kishiyama Y et al (2013) Future steps of LTE-A: evolution toward integration of local area and wide area systems. IEEE Wirel Commun 20(1):12–18. doi:10.1109/MWC.2013.6472194
Zugenmaier A, Aono H (2013) Security technology for SAE/LTE (system architecture evolution 2/LTE). NTT DOCOMO Tech J 11(3):28–30. http://www.nttdocomo.co.jp/english/binary/pdf/corporate/technology/rd/technical_journal/bn/vol11_3/vol11_3_027en.pdf. Accessed 15 Jul 2014
Di Pietro R, Guarino S (2013) Confidentiality and availability issues in mobile unattended wireless sensor networks. In: 14th IEEE international symposium and workshops on a world of wireless, mobile and multimedia networks (WoWMoM), Madrid, Spain, 4–7 Jun 2013, pp 1–6
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 The Author(s)
About this chapter
Cite this chapter
Harvey, M.G. (2014). Wireless Threats and Key Management Issues. In: Wireless Next Generation Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-11903-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-11903-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11902-1
Online ISBN: 978-3-319-11903-8
eBook Packages: Computer ScienceComputer Science (R0)