PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

An Anti-Clone Attack Key Management Scheme for DTMSN

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
PL
Schemat zarządzania siecią DTMSN uniemożliwiający atak klonowania
Języki publikacji
EN
Abstrakty
EN
This paper proposes a novel anti-clone attack key management scheme for DTMSN based on Physical Unclonable Function (PUF). In this scheme, sensor nodes have PUF units in their microprocessors. According to DTMSN security requirements, we design two types of keys in our scheme and take advantages of the physical characteristics of PUF unit to prevent nodes from cloning. Analysis and simulation indicate that the scheme is not only efficient and resource-saving, but also can resist clone attack and many other network attacks.
PL
W artykule opisano sieć typu DTMSN – delay tolerant mobile service network. Celem było opracowanie systemu uniemożliwiającego klonowanie.
Rocznik
Strony
361--364
Opis fizyczny
Bibliogr. 17 poz., schem., tab., wykr.
Twórcy
autor
  • Information Engineering University, Zhengzhou,450004,China
autor
  • Information Engineering University, Zhengzhou,450004,China
Bibliografia
  • [1] Y.Wang, F. Lin, and H.Wu, “Efficient data transmission in delay fault tolerant mobile sensor networks (DFT-MSN)”, IEEE International Conference on Network Protocols (ICNP-05), Boston, MA, November, 2005.pp.6-9.
  • [2] A.M.Hegland, E.Winjum, S.F.Mjolsnes, C.Rong, O.Kure, P.Spilling, “A survey of key management in ad hoc networks” , Commun. Surveys& Tuts., Vol.8(3),2006,pp.48-66.
  • [3] J.C. Lee, V.Leung,K.H.Wong, J.Cao, Henrry C. B. Chan,et.al, “Key management issues in wireless sensor networks: Current proposals and future developments” , IEEE Wireless Commun.,Vol.14(5),2007,pp.76-84.
  • [4] Yong Wang, Garhan Attebury, and Byrav Ramamurthy, “A survey of security issues in wireless sensor networks” , Commun. Surveys Tuts., Vol. 8, No. 2, pp. 2-23, 2006
  • [5] H.T.T Nguyen, M. Guizani, J.Minho, E.Huh, “An efficient signalrange-based probabilistic key predistribution scheme in a wireless sensor network”, IEEE Transactions on Vehicular Technology, Vol.58(5),2009, pp.2482-2497.
  • [6] L. Eschenauer and V. D. Gligor, “A key management scheme for distributed sensor networks,” Proc. of the 9th ACM Conference on Computer and Communication Security, Nov. 2002. pp. 41-47.
  • [7] W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A pairwise key pre-distribution scheme for wireless sensor networks,” in Proc. 10th ACM Conf. CCS, Oct. 2003, pp. 77–82.
  • [8] H.Zhu, X.Lin, R.Lu, X.Shen, D.Xing and Z.Cao “An opportunistic batch bundle authentication scheme for energy constrained DTNs”, The 29th IEEE International Conference on Computer Communications (INFOCOM2010), San Diego, CA. March 2010. pp.1-9 .
  • [9] A. Kate, G. Zaverucha and U. Hengartner, “Anonymity and security in delay tolerant networks”,The 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, Secure Communication,September 2007,pp.504-513.
  • [10] A.Seth,S.Keshav.“Practical security for disconnected nodes”,Secure Network Protocols, 2005. (NPSec). The 1st IEEE ICNP Workshop on Secure Network Protocols, 2005,pp.31-36.
  • [11] A.Wan,T.Bin,“A Secure and Highly Efficient Key Management Scheme for MANET”, AISS: Advances in Information Sciences and Service Sciences,2011,Vol.3(2), pp.12-22.
  • [12] G.E.Suh, S.Devadas, “Physical unclonable functions for device authentication and secret key generation”, Proc. 44th ACM Annual Design Automation Conference 2007, San Diego, CA, June 2007, pp. 9-14.
  • [13] H.Ghaith, O.Erdinc, S.Berk, “A tamper-proof and lightweight authentication scheme”, Pervasive Mobile Computing, Vol.4(6), 2008, pp. 807-818.
  • [14] P.Cortese, F.Gemmiti, B.Palazzi, M.Pizzonia, and M.Rimondini. “Efficient and Practical Authentication of PUFBased RFID Tags in Supply Chains”, IEEE International Conference on RFID-Technology and Applications (RFID-TA), Guangzhou, China. June 2010, pp.182-188.
  • [15] M. van Dijk B. Gassend, D. Clarke, and S. Devadas, “Controlled physical random functions”. In Proceedings of the 18th Annual Computer Security Conference, Las Vegas, NV, USA ,Dec 2002,pp.149-160.
  • [16] D. Johnson and D. Maltz. “Dynamic source routing in ad hoc wireless networks”. In: T. Imelinsky and H. Korth, editors, Mobile Computing, Kluwer Academic Publishers, 1996, pp.153-181.
  • [17] S. Zhu, S. Setia, and S. Jajodia. “LEAP: efficient security mechanisms for large-scale distributed sensor networks”. In 10th ACM conference on Computer and communication security (CCS’03), ACM Press, 2003,pp.62-72.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-2dcf8182-add1-42c7-8ebb-7b0d8507332d
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.