Skip to main content

On Node Capturing Attacker Strategies

  • Conference paper
  • First Online:
Security Protocols XXII (Security Protocols 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8809))

Included in the following conference series:

Abstract

In distributed environments, such as wireless networks, a common adversary is considered to take control over a fraction of the nodes and hence to affect the system behaviour. We have examined several key management schemes for wireless sensor networks where the adversary compromises all the secret keys stored on captured nodes. We propose a number of realistic movement strategies that an actual attacker could pursue to capture nodes and examine the fallout of these attack approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anderson, R., Chan, H., Perrig, A.: Key infection: smart trust for smart dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols, pp. 206–215. IEEE Computer Society, Washington, DC (2004)

    Google Scholar 

  2. Bonaci, T., Bushnell, L., Poovendran, R.: Node capture attacks in wireless sensor networks: a system theoretic approach. In: 2010 49th IEEE Conference on Decision and Control (CDC), pp. 6765–6772 (2010)

    Google Scholar 

  3. Chan, H., Perrig, A.: Pike: peer intermediaries for key establishment in sensor networks. In: INFOCOM 2005: Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 524–535, March 2005

    Google Scholar 

  4. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: 2003 Symposium on Security and Privacy, pp. 197–213, May 2003

    Google Scholar 

  5. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  6. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS ’02, pp. 41–47. ACM, New York (2002)

    Google Scholar 

  7. Hekmat, R., Van Mieghem, P.: Connectivity in wireless ad-hoc networks with a log-normal radio model. Mob. Netw. Appl. 11(3), 351–360 (2006)

    Article  Google Scholar 

  8. Hwang, J., Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN ’04, pp. 43–52. ACM, New York (2004)

    Google Scholar 

  9. Jurnečka, F., Stehlík, M., Matyáš, V.: Key management schemes for wireless sensor networks (2013). https://sourceforge.net/projects/kmsfwsn/. Accessed 22 May 2014

  10. Köpke, A., Swigulski, M., Wessel, K., Willkomm, D., Haneveld, P.T.K., Parker, T.E.V., Visser, O.W., Lichte, H.S., Valentin, S.: Simulating wireless and mobile networks in OMNeT++ the MiXiM vision. In: Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Simutools ’08, ICST, pp. 71:1–71:8. ICST, Brussels (2008)

    Google Scholar 

  11. Kůr, J., Matyáš, V., Švenda, P.: Evolutionary design of attack strategies. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds.) Security Protocols 2009. LNCS, vol. 7028, pp. 3–17. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  12. Lai, B., Kim, S., Verbauwhede, I.: Scalable session key construction protocol for wireless sensor networks. In: IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES), p. 7 (2002)

    Google Scholar 

  13. Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21, 993–999 (1978)

    Article  MATH  Google Scholar 

  14. Özdemir, S., Khalil, O.: Performance evaluation of key management schemes in wireless sensor networks. Gazi Univ. J. Sci. 25(2), 465–476 (2012)

    Google Scholar 

  15. Roman, R., Lopez, J., Alcaraz, C., Chen, H.H.: Sensekey - simplifying the selection of key management schemes for sensor networks. In: Proceedings of the 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, WAINA ’11, pp. 789–794. IEEE Computer Society, Washington, DC (2011)

    Google Scholar 

  16. Stetsko, A., Stehlik, M., Matyas, V.: Calibrating and comparing simulators for wireless sensor networks. In: 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 733–738 (2011)

    Google Scholar 

  17. Stetsko, A., Smolka, T., Jurnečka, F., Matyas, V.: On the credibility of wireless sensor network simulations: evaluation of intrusion detection system. In: Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques, SIMUTOOLS ’12, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 75–84. ICST, Brussels (2012)

    Google Scholar 

  18. Tague, P., Poovendran, R.: Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw. 5(6), 801–814 (2007)

    Article  Google Scholar 

  19. Varga, A.: Using the OMNeT++ discrete event simulation system in education. IEEE Trans. Educ. 42, 372 (1999)

    Article  Google Scholar 

  20. Vu, T.M., Williamson, C., Safavi-Naini, R.: Simulation modeling of secure wireless sensor networks. In: Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS ’09, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 30:1–30:10. ICST, Brussels (2009)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the GAP202/11/0422 project of the Czech Science Foundation. We are also grateful for helpful discussions and notes provided by our colleagues Petr Švenda, Dušan Klinec, Jiří Kůr, and by participants of the Security Protocols Workshop 2014, particularly Daniel Thomas and Virgil Gligor.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Filip Jurnečka .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Jurnečka, F., Stehlík, M., Matyáš, V. (2014). On Node Capturing Attacker Strategies. In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12400-1_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12399-8

  • Online ISBN: 978-3-319-12400-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics