A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

  • Park, Dong-Gook (Department of Information Technology, SunChon National University)
  • Published : 2009.06.30

Abstract

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

Keywords

References

  1. C. Beaver, D. Gallup, W. Neumann, and M. Torgerson, "Key Management for SCADA", Technical Report SAND2001-3252, Sandia National Laboratories - Cryptography and Information Systems Surety Department, March 2002
  2. R. Dawson and C. Boyd and E. Dawson and J.G. Nieto, "SKMA: a Key Management Architecture for SCADA Systems", ACSW Frontiers 2006, pp.183-192
  3. C. Gunther, "An Identity-Based Key-Exchange Protocol", Advances in Cryptology - Eurocrypt'89, Springer-Verlag (LNCS 434),1990, pp.29-37 https://doi.org/10.1007/3-540-46885-4_5
  4. C. Hartung and J. Balasalle and R. Han, "Node Compromise in Sensor Networks: The Need f()r Secure Systems", Technical Report CU-CS-990-05, Department of Computer Scienee, University of Colorado at Boulder, January 2005
  5. C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Counterneasures", First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 293-315
  6. M. Klonowski and M. Kutylowski and M. Ren and K. Rybarezyk, "Forward-Seeure Key Evolution in Wireless Sensor Networks", CANS, Springer-Verlag (LNCS 4856), 2007, pp. 102-120 https://doi.org/10.1007/978-3-540-76969-9_7
  7. L. Lamport, "Password authentication with insecure communication", Communications of the ACM, 24( 11), 1981, pp.770-772 https://doi.org/10.1145/358790.358797
  8. S. Mauw, I van Vessem, and B. Bos, "Forward Secure Communication in Wireless Sensor Networks", Third International Conference Security in Pervasive Computing (SPC'06), Springer-Verlag (LNCS 3934), 2006, pp.32-42 https://doi.org/10.1007/11734666_4
  9. R. McClanahan, "SCADA and IP: Is Network Convergence Really Here?", Industry Applications Magazine, IEEE, 2003, pp.29-36 https://doi.org/10.1109/MIA.2003.1180947
  10. D.K. Nilsson, T. Roosta, U. Lindqvist and A. Valdes, "Key Management and Secure Software Updates in Wireless Process Control Environments", Proceedings of the first ACM conference on Wireless network security (WiSec '08), March 31-April 2, 2008, Alexandria, VA, pp.100-108 https://doi.org/10.1145/1352533.1352550
  11. M. Ohkubo, K. Suzuki, and S. Kinoshita, "Cryptographie Approach to Privacy-Friendly Tags", RFlD Privacy Workshop, 2003
  12. L. Pietre-Cambacedes and P. Sitbon, "Cryptographic Key Management for SCADA Systems-Issues and Perspectives", International Journal of SecuriJy and its Applications, Vol 2, No.3, 2008, pp. 31-40
  13. M. Ren, K.D. Tanmoy and J. Zhou, "Diverging Keys in Wireless Sensor Networks", Information Security, Springer-Verlag (LNCS 4176), 2006, pp. 257-269 https://doi.org/10.1007/11836810_19
  14. R. Roman and C. Alcaraz and J. Lopez, "The Role of Wireless Sensor Networks in the Area of Critical Information Infrastructure Protection", Information Security Technical Report, Vol.12, Issue 1, 2007, pp.24-31 https://doi.org/10.1016/j.istr.2007.02.003
  15. D. Park, "A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks", This paper will appear in Journal of The Korea Society of Digital Industry & Information Management, 2009
  16. P. Szczechowiak, L.B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: Testing the limits of elliptic curve cryptography in sensor networks", European conference on Wireless Sensor Networks (EWSN'08), Springer-Verlag (LNCS 4913), 2008, ppJ05-320 https://doi.org/10.1007/978-3-540-77690-1_19
  17. MAM. Vieiral, C.N. Coelho Jr, D.C. da Silva Jr., and J.M. da Mata, "Survey on wireless sensor network devices", Proceedings of IEEE Conference on Emerging Technologies and Factory Automation (EFTA03), 2003, pp.537-544 https://doi.org/10.1109/ETFA.2003.1247753
  18. J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey", Chapter 17 in Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, 2006