Vulnerabilities and improvements of Du-Xiao-Chen-Wu's secure cell relay routing protocol for sensor networks

Keunwoo Rhee, Byunghee Lee, Dongho Won, Hac Yun Na, Seungjoo Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In 2006, Du, Xiao, Chen, and Wu proposed a routing protocol for sensor networks using cell relay. They claimed their protocol was secure since they used pairwise key establishment. However, an adversary can implement attacks without keys or with only one newly deployed compromised node. Therefore, in this paper, we point out the vulnerabilities of this protocol and propose an improved protocol.

Original languageEnglish
Title of host publicationProceedings - 4th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010
Pages1-4
Number of pages4
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event4th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010 - Venice, Italy
Duration: 2010 Jul 182010 Jul 25

Publication series

NameProceedings - 4th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010

Other

Other4th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010
CountryItaly
CityVenice
Period10/7/1810/7/25

Keywords

  • Attacks on sensor network
  • Key establishment
  • Routing protocol
  • Sensor networks

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Fingerprint Dive into the research topics of 'Vulnerabilities and improvements of Du-Xiao-Chen-Wu's secure cell relay routing protocol for sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Rhee, K., Lee, B., Won, D., Na, H. Y., & Kim, S. (2010). Vulnerabilities and improvements of Du-Xiao-Chen-Wu's secure cell relay routing protocol for sensor networks. In Proceedings - 4th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010 (pp. 1-4). [5633152] (Proceedings - 4th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010). https://doi.org/10.1109/SECURWARE.2010.8