|
计算机应用研究 2012
Polynomial-based defense scheme against node capture attack in WSN
|
Abstract:
Considering the security issue caused by captured node in wireless sensor networks, this paper presented a polynomial-based scheme to defend node capture attack. This scheme bounded the key material of each node with its original deployment time and identity. When the nodes negotiated the session key, they needed to mutually authenticate the interval time among the deployment time and the current time, and it made use of the base station to verify the legitimacy of the node. This scheme could prevent attackers from eavesdropping communication, and avoid the captured nodes establishing a session key with legitimate nodes at the same time, which effectively prevented the capture nodes re-joining the network. Analysis shows the safety and low system overhead of the scheme.