TY - GEN
T1 - DLS
T2 - 2010 International Conference in Information Science and Applications, ICISA 2010
AU - Park, Chul Hyun
AU - Zhang, Yi Ying
AU - Kim, In Tai
AU - Park, Myong Soon
PY - 2010
Y1 - 2010
N2 - Among of Security schemes for Wireless Sensor Networks (WSNs), key management is challenging issue to ensure security of applications. The key management is to establish the required keys between nodes which exchange data. Also, key revocation scheme is required part of the key management. Among of key revocation schemes, the KeyRev is securer than previous schemes, because it depends on using session key which based on personal key share distribution in network. However, the KeyRev did not consider about duration of session and analysis of diverse attack models. Using fixed duration of session, it gives more chances to attacker which can contaminate other nodes by using compromised node for left time. It causes that other attacks can infect sensor by using compromised node as surrogate in network. Thus, we propose dynamic level session key revocation protocol (DLS) which has divided time intervals, it called level. When we use dynamic level session scheme based on detecting number of prior compromised nodes, it is immune to continuous same pattern of attack which cause next diverse attacks. Therefore, our analysis shows that the DLS are more secured than the fixed duration of session against diverse attack for WSNs.
AB - Among of Security schemes for Wireless Sensor Networks (WSNs), key management is challenging issue to ensure security of applications. The key management is to establish the required keys between nodes which exchange data. Also, key revocation scheme is required part of the key management. Among of key revocation schemes, the KeyRev is securer than previous schemes, because it depends on using session key which based on personal key share distribution in network. However, the KeyRev did not consider about duration of session and analysis of diverse attack models. Using fixed duration of session, it gives more chances to attacker which can contaminate other nodes by using compromised node for left time. It causes that other attacks can infect sensor by using compromised node as surrogate in network. Thus, we propose dynamic level session key revocation protocol (DLS) which has divided time intervals, it called level. When we use dynamic level session scheme based on detecting number of prior compromised nodes, it is immune to continuous same pattern of attack which cause next diverse attacks. Therefore, our analysis shows that the DLS are more secured than the fixed duration of session against diverse attack for WSNs.
KW - Dynamic level session
KW - Key revocation
KW - Security
KW - Session key
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=77954438261&partnerID=8YFLogxK
U2 - 10.1109/ICISA.2010.5480578
DO - 10.1109/ICISA.2010.5480578
M3 - Conference contribution
AN - SCOPUS:77954438261
SN - 9781424459438
T3 - 2010 International Conference on Information Science and Applications, ICISA 2010
BT - 2010 International Conference on Information Science and Applications, ICISA 2010
Y2 - 21 April 2010 through 23 April 2010
ER -