On Node Capturing Attacker Strategies

  • Filip JurnečkaEmail author
  • Martin Stehlík
  • Vashek Matyáš
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8809)


In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches.



This work was supported by the GAP202/11/0422 project of the Czech Science Foundation. We are also grateful for helpful discussions and notes provided by our colleagues Petr Švenda, Dušan Klinec, Jiří Kůr, and by participants of the Security Protocols Workshop 2014, particularly Daniel Thomas and Virgil Gligor.


  1. 1.
    Anderson, R., Chan, H., Perrig, A.: Key infection: smart trust for smart dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols, pp. 206–215. IEEE Computer Society, Washington, DC (2004)Google Scholar
  2. 2.
    Bonaci, T., Bushnell, L., Poovendran, R.: Node capture attacks in wireless sensor networks: a system theoretic approach. In: 2010 49th IEEE Conference on Decision and Control (CDC), pp. 6765–6772 (2010)Google Scholar
  3. 3.
    Chan, H., Perrig, A.: Pike: peer intermediaries for key establishment in sensor networks. In: INFOCOM 2005: Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 524–535, March 2005Google Scholar
  4. 4.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: 2003 Symposium on Security and Privacy, pp. 197–213, May 2003Google Scholar
  5. 5.
    Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, pp. 41–47. ACM, New York (2002)Google Scholar
  7. 7.
    Hekmat, R., Van Mieghem, P.: Connectivity in wireless ad-hoc networks with a log-normal radio model. Mob. Netw. Appl. 11(3), 351–360 (2006)CrossRefGoogle Scholar
  8. 8.
    Hwang, J., Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN ’04, pp. 43–52. ACM, New York (2004)Google Scholar
  9. 9.
    Jurnečka, F., Stehlík, M., Matyáš, V.: Key management schemes for wireless sensor networks (2013). Accessed 22 May 2014
  10. 10.
    Köpke, A., Swigulski, M., Wessel, K., Willkomm, D., Haneveld, P.T.K., Parker, T.E.V., Visser, O.W., Lichte, H.S., Valentin, S.: Simulating wireless and mobile networks in OMNeT++ the MiXiM vision. In: Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Simutools ’08, ICST, pp. 71:1–71:8. ICST, Brussels (2008)Google Scholar
  11. 11.
    Kůr, J., Matyáš, V., Švenda, P.: Evolutionary design of attack strategies. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds.) Security Protocols 2009. LNCS, vol. 7028, pp. 3–17. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  12. 12.
    Lai, B., Kim, S., Verbauwhede, I.: Scalable session key construction protocol for wireless sensor networks. In: IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES), p. 7 (2002)Google Scholar
  13. 13.
    Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21, 993–999 (1978)CrossRefzbMATHGoogle Scholar
  14. 14.
    Özdemir, S., Khalil, O.: Performance evaluation of key management schemes in wireless sensor networks. Gazi Univ. J. Sci. 25(2), 465–476 (2012)Google Scholar
  15. 15.
    Roman, R., Lopez, J., Alcaraz, C., Chen, H.H.: Sensekey - simplifying the selection of key management schemes for sensor networks. In: Proceedings of the 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, WAINA ’11, pp. 789–794. IEEE Computer Society, Washington, DC (2011)Google Scholar
  16. 16.
    Stetsko, A., Stehlik, M., Matyas, V.: Calibrating and comparing simulators for wireless sensor networks. In: 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 733–738 (2011)Google Scholar
  17. 17.
    Stetsko, A., Smolka, T., Jurnečka, F., Matyas, V.: On the credibility of wireless sensor network simulations: evaluation of intrusion detection system. In: Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques, SIMUTOOLS ’12, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 75–84. ICST, Brussels (2012)Google Scholar
  18. 18.
    Tague, P., Poovendran, R.: Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw. 5(6), 801–814 (2007)CrossRefGoogle Scholar
  19. 19.
    Varga, A.: Using the OMNeT++ discrete event simulation system in education. IEEE Trans. Educ. 42, 372 (1999)CrossRefGoogle Scholar
  20. 20.
    Vu, T.M., Williamson, C., Safavi-Naini, R.: Simulation modeling of secure wireless sensor networks. In: Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS ’09, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 30:1–30:10. ICST, Brussels (2009)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Filip Jurnečka
    • 1
    Email author
  • Martin Stehlík
    • 1
  • Vashek Matyáš
    • 1
  1. 1.Faculty of InformaticsMasaryk UniversityBrnoCzech Republic

Personalised recommendations