Secure key management architecture against sensor-node fabrication attacks

Jeffrey Dwoskin, Dahai Xu, Jianwei Huang, Mung Chiang, Ruby Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Abstract

In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show that the Successful Attack Probability (SAP) can be as high as 42.6% with the fabrication of only 6 copies from captured nodes comprising only 3% of all nodes. In this paper, we propose two low-cost secure-architecture- based techniques to improve the security against such node fabrication attacks. Our new architectures, specifically targeted at the sensor-node platform, protect long-term keys using a root of trust embedded in the hardware System-on-a-Chip (SoC). This prevents an adversary from extracting these protected long-term keys from a captured node to fabricate new nodes. The extensive simulation results show that the proposed architecture can significantly decrease the SAP and increase the security level of key management for mobile ad hoc networks.

Original languageEnglish (US)
Title of host publicationIEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
Pages166-171
Number of pages6
DOIs
StatePublished - 2007
Event50th Annual IEEE Global Telecommunications Conference, GLOBECOM 2007 - Washington, DC, United States
Duration: Nov 26 2007Nov 30 2007

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Other

Other50th Annual IEEE Global Telecommunications Conference, GLOBECOM 2007
Country/TerritoryUnited States
CityWashington, DC
Period11/26/0711/30/07

All Science Journal Classification (ASJC) codes

  • General Engineering

Keywords

  • Key management
  • Mobile ad hoc networks
  • Secret-protected
  • Sensor network

Fingerprint

Dive into the research topics of 'Secure key management architecture against sensor-node fabrication attacks'. Together they form a unique fingerprint.

Cite this