Practical Attacks on Hybrid Group Key Management for SOHAN (original) (raw)

A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks

—Secure key management is crucial to meet the security goals to prevent the Wireless Sensor Networks (WSNs) being compromised by an adversary. Owing to ad-hoc nature and resource limitations of sensor networks, provisioning a right key management is challenging. In this paper we present a Novel Secure Key Management (NSKM) module providing an efficient scalable post-distribution key establishment that allows the hierarchical clustering topology platform to provision acceptable security services. To the best of our knowledge this module is the first implemented security module for wireless sensor networks that provisions reasonable resistance against replay and node capture attacks. Furthermore, it provides highly lightweight and scalable scheme. Also it is acceptable to be used in a wireless sensor network of thousands of sensor nodes.

A Survey on Attacks, Security Mechanisms and Secure Extensions of Hierarchical Clustering Based Sensor Networks

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2022

Wireless Sensor Networks (WSNs) consists of large number of sensors deployed in regions required by the applications to collect information about the surrounding environment. WSNs are highly vulnerable to security attacks at various levels due to their distributed nature, multi-hop data forwarding, and open wireless medium. A clustering-based routing protocol LEACH is a successful protocol for routing in WSNs as well as evenly utilizing energy of sensor nodes since all sensor nodes have limited source of energy. However, LEACH protocol also has some flaws which can attract attackers and they can cause serious damage either physically or it can also steal information from the network. Due to this reason security is the main problem of LEACH protocol and many secure versions of this protocol have been designed to make it resilient against insider as well as outsider attackers. In this paper, we discuss some of the threats in WSNs along with various kinds of attacks as well as mechanism to deal with such threats. Furthermore, we discuss LEACH protocol and its extensions, various techniques used to define secure LEACH which can protect network from entering intruders. Lastly, we compare some secure LEACH schemes like cryptographic-based or trust-based scheme.

Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks

International Journal of Wireless Networks and Broadband Technologies, 2015

The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates.