• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

[CORRESPONDENCE] On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks

Vol. 3, No. 4, August 30, 2009
10.3837/tiis.2009.04.003, Download Paper (Free):

Abstract

In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
A. Mohaisen, J. W. Choi, D. Hong, "[CORRESPONDENCE] On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks," KSII Transactions on Internet and Information Systems, vol. 3, no. 4, pp. 376-384, 2009. DOI: 10.3837/tiis.2009.04.003.

[ACM Style]
Abedelaziz Mohaisen, Jeong Woon Choi, and Dowon Hong. 2009. [CORRESPONDENCE] On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks. KSII Transactions on Internet and Information Systems, 3, 4, (2009), 376-384. DOI: 10.3837/tiis.2009.04.003.

[BibTeX Style]
@article{tiis:19825, title="[CORRESPONDENCE] On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks", author="Abedelaziz Mohaisen and Jeong Woon Choi and Dowon Hong and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2009.04.003}, volume={3}, number={4}, year="2009", month={August}, pages={376-384}}