IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA
View Sample PDF
Author(s): Hani Alzaid (Queensland University of Technology, Australia & King Abdulaziz City for Science and Technology, Saudi Arabia), DongGook Park (Sunchon National University, South Korea), Juan Gonzàlez Nieto (Queensland University of Technology, Australia), Colin Boyd (Queensland University of Technology, Australia)and Ernest Foo (Queensland University of Technology, Australia)
Copyright: 2011
Pages: 20
Source title: Emerging Technologies in Wireless Ad-hoc Networks: Applications and Future Development
Source Author(s)/Editor(s): Raul Aquino-Santos (University of Colima, Mexico), Víctor Rangel-Licea (National Autonomous University of Mexico, Mexico)and Arthur Edwards-Block (University of Colima, México)
DOI: 10.4018/978-1-60960-027-3.ch003

Purchase

View A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA on the publisher's website for pricing and purchasing information.

Abstract

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor network applications. The PCS/ SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in this environment, however, are still open to devastating attacks such as node capture, which makes the design of secure key management challenging. This chapter introduces an adversary model with which we can assess key management protocols. It also proposes a key management scheme to defeat node capture attack by offering both forward and backward secrecies. The scheme overcomes the pitfalls of a comparative scheme while being not computationally more expensive.

Related Content

Nithin Kalorth, Vidya Deshpande. © 2024. 7 pages.
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane. © 2024. 24 pages.
T.S. Sujith. © 2024. 13 pages.
C. Suganya, M. Vijayakumar. © 2024. 11 pages.
B. Harry, Vijayakumar Muthusamy. © 2024. 19 pages.
Munise Hayrun Sağlam, Ibrahim Kirçova. © 2024. 19 pages.
Elif Karakoç Keskin. © 2024. 19 pages.
Body Bottom