Path keys are secrets established between communicating devices that do not share a pre-distributed key. They are required by most key pre-distribution schemes for sensor networks, because topology is unknown before deployment and storing complete pairwise-unique keys is infeasible for low-cost devices such as sensors. Unfortunately, path keys have often been neglected by existing work on sensor network security. In particular, proposals for revoking identified malicious nodes from a sensor network fail to remove any path keys associated with a revoked node. We describe a number of resulting attacks which allow a revoked node to continue participating on a network. We then propose techniques for ensuring revocation is complete: universal notification to remove keys set up with revoked nodes, path-key records to identify intermediaries that are later revoked, and blacklists to prevent unauthorized reentry via undetected malicious nodes. Path keys also undermine identity authentication, enabling Sybil attacks against random pairwise key pre-distribution. © 2007 International Federation for Information Processing.
CITATION STYLE
Moore, T., & Clulow, J. (2007). Secure path-key revocation for symmetric key pre-distribution schemes in sensor networks. In IFIP International Federation for Information Processing (Vol. 232, pp. 157–168). https://doi.org/10.1007/978-0-387-72367-9_14
Mendeley helps you to discover research relevant for your work.