Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective

碩士 === 國立中山大學 === 資訊工程學系研究所 === 100 === Wireless sensor networks (WSNs) have been widely used in many areas, such as early earthquake monitoring, building structure monitoring, and military surveillance. In this thesis, we focus on the wireless sensor network deployed in the battlefield, using rando...

Full description

Bibliographic Details
Main Authors: Jiun-An Lin, 林俊安
Other Authors: Wen-Shyong Heieh
Format: Others
Language:en_US
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/26941528854883725694
id ndltd-TW-100NSYS5392011
record_format oai_dc
spelling ndltd-TW-100NSYS53920112015-10-13T21:17:53Z http://ndltd.ncl.edu.tw/handle/26941528854883725694 Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective 基於無線感測網路中隨機金鑰分配機制之攻擊者分析 Jiun-An Lin 林俊安 碩士 國立中山大學 資訊工程學系研究所 100 Wireless sensor networks (WSNs) have been widely used in many areas, such as early earthquake monitoring, building structure monitoring, and military surveillance. In this thesis, we focus on the wireless sensor network deployed in the battlefield, using random key predistribution scheme. Firstly we presented an analysis of the security impacts by node capture attack. Also, based on the node cloning attack, we proposed a new attack scheme, called compromised key redistribution attack, and discussed related attack scenarios. Besides, we have found out and conjectured that, when the overlapping factor of compromised key set is larger than 0.05, it is very possible (almost 90%) that the number of distinct compromised keys is 10.5% of the original key pool. This conjecture helps the adversary estimate the approximated size of original key pool by calculating the overlapping factor, thus calculate the probability that malicious nodes successfully establish connections with legitimate nodes. Wen-Shyong Heieh 謝文雄 2012 學位論文 ; thesis 51 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立中山大學 === 資訊工程學系研究所 === 100 === Wireless sensor networks (WSNs) have been widely used in many areas, such as early earthquake monitoring, building structure monitoring, and military surveillance. In this thesis, we focus on the wireless sensor network deployed in the battlefield, using random key predistribution scheme. Firstly we presented an analysis of the security impacts by node capture attack. Also, based on the node cloning attack, we proposed a new attack scheme, called compromised key redistribution attack, and discussed related attack scenarios. Besides, we have found out and conjectured that, when the overlapping factor of compromised key set is larger than 0.05, it is very possible (almost 90%) that the number of distinct compromised keys is 10.5% of the original key pool. This conjecture helps the adversary estimate the approximated size of original key pool by calculating the overlapping factor, thus calculate the probability that malicious nodes successfully establish connections with legitimate nodes.
author2 Wen-Shyong Heieh
author_facet Wen-Shyong Heieh
Jiun-An Lin
林俊安
author Jiun-An Lin
林俊安
spellingShingle Jiun-An Lin
林俊安
Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective
author_sort Jiun-An Lin
title Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective
title_short Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective
title_full Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective
title_fullStr Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective
title_full_unstemmed Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective
title_sort analysis of random key predistribution scheme for wireless sensor network: an adversarial perspective
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/26941528854883725694
work_keys_str_mv AT jiunanlin analysisofrandomkeypredistributionschemeforwirelesssensornetworkanadversarialperspective
AT línjùnān analysisofrandomkeypredistributionschemeforwirelesssensornetworkanadversarialperspective
AT jiunanlin jīyúwúxiàngǎncèwǎnglùzhōngsuíjījīnyàofēnpèijīzhìzhīgōngjīzhěfēnxī
AT línjùnān jīyúwúxiàngǎncèwǎnglùzhōngsuíjījīnyàofēnpèijīzhìzhīgōngjīzhěfēnxī
_version_ 1718060489653616640