On active attacks on sensor network key distribution schemes

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper concerns sensor network key distribution schemes (KDS) based on symmetric-key techniques. We analyze the problem of active attacks against such schemes. By active attacks we mean those attacks, where the adversary can maliciously disturb the communication between the sensors. We observe that the active adversary that captured even a small number of sensors, can anyway get a full control over the network, no matter how strong the KDS is. Therefore we conclude that the best scheme in this context is the one based on the method of Blöm (1984) (which guarantees perfect secrecy of the keys, as long as the number of corrupted sensors is small). © 2009 Springer-Verlag.

Cite

CITATION STYLE

APA

Dziembowski, S., Mei, A., & Panconesi, A. (2009). On active attacks on sensor network key distribution schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5804 LNCS, pp. 52–63). https://doi.org/10.1007/978-3-642-05434-1_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free