Abstract
In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anderson, R., Chan, H., Perrig, A.: Key infection: smart trust for smart dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols, pp. 206–215. IEEE Computer Society, Washington, DC (2004)
Bonaci, T., Bushnell, L., Poovendran, R.: Node capture attacks in wireless sensor networks: a system theoretic approach. In: 2010 49th IEEE Conference on Decision and Control (CDC), pp. 6765–6772 (2010)
Chan, H., Perrig, A.: Pike: peer intermediaries for key establishment in sensor networks. In: INFOCOM 2005: Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 524–535, March 2005
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: 2003 Symposium on Security and Privacy, pp. 197–213, May 2003
Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, pp. 41–47. ACM, New York (2002)
Hekmat, R., Van Mieghem, P.: Connectivity in wireless ad-hoc networks with a log-normal radio model. Mob. Netw. Appl. 11(3), 351–360 (2006)
Hwang, J., Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN ’04, pp. 43–52. ACM, New York (2004)
Jurnečka, F., Stehlík, M., Matyáš, V.: Key management schemes for wireless sensor networks (2013). https://sourceforge.net/projects/kmsfwsn/. Accessed 22 May 2014
Köpke, A., Swigulski, M., Wessel, K., Willkomm, D., Haneveld, P.T.K., Parker, T.E.V., Visser, O.W., Lichte, H.S., Valentin, S.: Simulating wireless and mobile networks in OMNeT++ the MiXiM vision. In: Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Simutools ’08, ICST, pp. 71:1–71:8. ICST, Brussels (2008)
Kůr, J., Matyáš, V., Švenda, P.: Evolutionary design of attack strategies. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds.) Security Protocols 2009. LNCS, vol. 7028, pp. 3–17. Springer, Heidelberg (2013)
Lai, B., Kim, S., Verbauwhede, I.: Scalable session key construction protocol for wireless sensor networks. In: IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES), p. 7 (2002)
Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21, 993–999 (1978)
Özdemir, S., Khalil, O.: Performance evaluation of key management schemes in wireless sensor networks. Gazi Univ. J. Sci. 25(2), 465–476 (2012)
Roman, R., Lopez, J., Alcaraz, C., Chen, H.H.: Sensekey - simplifying the selection of key management schemes for sensor networks. In: Proceedings of the 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, WAINA ’11, pp. 789–794. IEEE Computer Society, Washington, DC (2011)
Stetsko, A., Stehlik, M., Matyas, V.: Calibrating and comparing simulators for wireless sensor networks. In: 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 733–738 (2011)
Stetsko, A., Smolka, T., Jurnečka, F., Matyas, V.: On the credibility of wireless sensor network simulations: evaluation of intrusion detection system. In: Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques, SIMUTOOLS ’12, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 75–84. ICST, Brussels (2012)
Tague, P., Poovendran, R.: Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw. 5(6), 801–814 (2007)
Varga, A.: Using the OMNeT++ discrete event simulation system in education. IEEE Trans. Educ. 42, 372 (1999)
Vu, T.M., Williamson, C., Safavi-Naini, R.: Simulation modeling of secure wireless sensor networks. In: Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS ’09, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 30:1–30:10. ICST, Brussels (2009)
Acknowledgement
This work was supported by the GAP202/11/0422 project of the Czech Science Foundation. We are also grateful for helpful discussions and notes provided by our colleagues Petr Švenda, Dušan Klinec, Jiří Kůr, and by participants of the Security Protocols Workshop 2014, particularly Daniel Thomas and Virgil Gligor.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Jurnečka, F., Stehlík, M., Matyáš, V. (2014). On Node Capturing Attacker Strategies. In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-12400-1_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12399-8
Online ISBN: 978-3-319-12400-1
eBook Packages: Computer ScienceComputer Science (R0)