2012 | OriginalPaper | Buchkapitel
Foisting and Stealing of Keys in Sensor Networks
verfasst von : Peng Wang, Chinya Ravishankar
Erschienen in: Wireless Sensor Networks
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
We consider cryptographic key establishment in sensor networks without PKI or trusted third parties, using pairwise trust relationships between intermediaries. We describe a novel attack called
key foisting
that defeats current schemes, compromising 90% of the path keys with only 10% of the sensors in the network seized. We then present a two-way path-key establishment scheme that resists foisting. It reduces the probability of successful key foisting to nearly zero even with 20% of sensors seized. Its overhead is affordable, and its resilience is excellent.