Key management and secure software updates in wireless process control environments

@inproceedings{Nilsson2008KeyMA,
  title={Key management and secure software updates in wireless process control environments},
  author={Dennis K. Nilsson and Tanya Roosta and Ulf Lindqvist and Alfonso Valdes},
  booktitle={WiSec '08},
  year={2008}
}
Process control systems using wireless sensor nodes are large and complex environments built to last for a long time. Cryptographic keys are typically preloaded in the wireless nodes prior to deployment and used for the rest of their lifetime. To reduce the risk of successful cryptanalysis, new keys must be established (rekeying). We have designed a rekeying scheme that provides both backward and forward secrecy. Furthermore, since these nodes are used for extensive periods of time, there is a… 

Figures from this paper

Secure Firmware Updates over the Air in Intelligent Vehicles
  • D. Nilsson, U. Larson
  • Computer Science
    ICC Workshops - 2008 IEEE International Conference on Communications Workshops
  • 2008
TLDR
This paper presents a protocol for secure firmware updates over the air, which provides data integrity, data authentication, data confidentiality, and freshness, and is well suited to the limited hardware resources in the wireless vehicle environment.
Secure program update using broadcast encryption for clustered wireless sensor networks
  • M. Nirmala, A. Manjunath
  • Computer Science
    2010 Sixth International conference on Wireless Communication and Sensor Networks
  • 2010
TLDR
A confidential network program update protocol for clustered wireless sensor networks that provides confidentiality and authentication with high computational effort and power consumption and is resilient to malicious program image injection by the compromised nodes.
A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA
  • DongGook Park
  • Computer Science
    J. Inform. and Commun. Convergence Engineering
  • 2009
TLDR
A key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies and overcomes the pitfalls which Nilsson et al.
Confidential Program update with dynamic key computation for clustered wireless sensor networks
  • M. Nirmala, A. Manjunath
  • Computer Science
    2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)
  • 2011
TLDR
A confidential network program update protocol for clustered wireless sensor networks that provides confidentiality and authentication with high computational effort and power consumption and is resilient to malicious program image injection by the compromised nodes.
Toward trusted wireless sensor networks
TLDR
The design and implementation of a trusted sensor node that provides Internet-grade security at low system cost and analyzed system performance using metrics that are important for WSN applications such as computation time, memory size, energy consumption and cost show that trustedFleck significantly outperforms previous approaches.
Low-cost key management for hierarchical wireless vehicle networks
TLDR
This paper proposes low-cost key management protocols for rekeying of the link keys and the public/private key pair of the portal and analyzed a hypothetical scenario for hierarchical wireless vehicle networks consisting of a central portal and a large number of vehicles.
SCUMG: Secure Code Update for Multicast Group in Wireless Sensor Networks
  • M. Nirmala, A. Manjunath
  • Computer Science
    2015 12th International Conference on Information Technology - New Generations
  • 2015
TLDR
A scheme for secure code update for multi-cast groups and a key agreement protocol is developed that provides confidentiality and immediate authentication and is resilient to malicious code update by compromised nodes and provides security against various attacks.
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA
TLDR
A fix to the forward & backward secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems is proposed in order to limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched.
Novel security mechanisms for wireless sensor networks
TLDR
This thesis demonstrates that false alarms can be eliminated by analysing the CSI value of a transmitted packet at multiple receivers, and presents a framework that provides confidential data storage in WSNs with minimal impact on sensor node operation and performance.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 26 REFERENCES
Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust
TLDR
Using initial trust built from a small set of shared keys, low-cost protocols enable neighboring sensors to authenticate and establish secure local links and are applied to secure a perimeter monitoring application.
TinyPK: securing sensor networks with public key technology
TLDR
The design and implementation of public-key-(PK)-based protocols that allow authentication and key agreement between a sensor network and a third party as well as between two sensor networks are described.
Securing the Deluge network programming system
TLDR
The solution to the secure programming problem leverages authenticated streams, is consistent with the limited resources of a typical sensor node, and can be used to secure existing network programming systems.
A key-management scheme for distributed sensor networks
TLDR
A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Group Key Management for Secure Multicasting in Remote Software Upload to Future Vehicles
TLDR
This paper investigates issues in designing key management architectures for secure multicast network, particularly for remote software update in future vehicles and proposes to use decentralized key management technique to generate and distribute multicast session key to the group members.
MiniSec: A Secure Sensor Network Communication Architecture
TLDR
A publicly available implementation of MiniSec is presented, one tailored for single-source communication, and another tailored for multi-source broadcast communication, that scales to large networks.
On the security of public key protocols
  • D. Dolev, A. Yao
  • Computer Science
    22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)
  • 1981
TLDR
Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
TinySec: a link layer security architecture for wireless sensor networks
TLDR
TinySec is introduced, the first fully-implemented link layer security architecture for wireless sensor networks, and results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.
Strengthening Digital Signatures Via Randomized Hashing
TLDR
The goal is to free practical digital signature schemes from their current reliance on strong collision resistance by basing the security of these schemes on significantly weaker properties of the underlying hash function, thus providing a safety net in case the hashes in use turn out to be less resilient to collision search than initially thought.
OCB: a block-cipher mode of operation for efficient authenticated encryption
TLDR
It is proved OCB secure, quantifying the adversary's ability to violate the mode's privacy or authenticity in terms of the quality of its block cipher as a pseudorandom permutation (PRP) or as a strong PRP, respectively.
...
1
2
3
...