Skip to main content

Wireless Threats and Key Management Issues

  • Chapter
  • First Online:
Wireless Next Generation Networks

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSELECTRIC))

  • 645 Accesses

Abstract

Secure routing in wireless sensor networks and secure key management for mobility in non-cellular wireless and mobile networks are discussed in the light of threats that have to be addressed by networks connected to the mobile Internet. Current solutions involve large computation and communication overhead in the calculation of trust levels, expected outcomes or behaviors, and key handovers which compromise confidentiality and availability. These problems further motivate the need for a more efficient and flexible trust model that reflects human social interaction. A virtue-based trust model can be used to support the cooperation and collaboration required between network nodes in local information sharing schemes to securely route packets and distribute secret keys to target networks. In addition to protecting source and location confidentiality, such schemes can help ensure availability through energy-efficient information diffusion techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kisner RA et al (2010) Cybersecurity through real-time distributed control systems. Oak Ridge National Laboratory, ORNL/TM-2010/30, pp 1–14

    Google Scholar 

  2. Vasilache RA et al (2013) Comparative evaluation of trust mechanisms for wireless sensor networks. In: 11th RoEduNet international conference, Sinaia, Romania, 17–19 Jan 2013, pp 1–5

    Google Scholar 

  3. Barker E et al (2013) A framework for designing cryptographic key management systems. NIST, Special Publication 800–130. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-130.pdf. Accessed 15 Jul 2014

  4. Barker E et al (2012) Recommendations for key management. NIST, Special Publication 800–57, Part 1, rev 3. http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf. Accessed 15 Jul 2014

  5. Bergstra J, Burgess M (2009) Local and global trust based on the concept of promises. Computing Research Repository (CORR), paper 0912.4637. http://arxiv.org/pdf/0912.4637.pdf. Accessed 15 Jul 2014

  6. Hoeper K et al (2008) Security challenges in seamless mobility–how to ‘handover’ the keys? In: 4th international ACM wireless internet conference (WICON ’08), Maui, HI, 17–19 Nov 2008, pp 2–3

    Google Scholar 

  7. Chen L, Gong G (2012) Wireless security: security for mobility. In: Communication system security. CRC Press, New York

    Google Scholar 

  8. Forsberg D et al (2013) LTE security, Chap 2, 2nd edn. Wiley, Hoboken

    Google Scholar 

  9. Kishiyama Y et al (2013) Future steps of LTE-A: evolution toward integration of local area and wide area systems. IEEE Wirel Commun 20(1):12–18. doi:10.1109/MWC.2013.6472194

    Article  Google Scholar 

  10. Zugenmaier A, Aono H (2013) Security technology for SAE/LTE (system architecture evolution 2/LTE). NTT DOCOMO Tech J 11(3):28–30. http://www.nttdocomo.co.jp/english/binary/pdf/corporate/technology/rd/technical_journal/bn/vol11_3/vol11_3_027en.pdf. Accessed 15 Jul 2014

  11. Di Pietro R, Guarino S (2013) Confidentiality and availability issues in mobile unattended wireless sensor networks. In: 14th IEEE international symposium and workshops on a world of wireless, mobile and multimedia networks (WoWMoM), Madrid, Spain, 4–7 Jun 2013, pp 1–6

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael G. Harvey .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Harvey, M.G. (2014). Wireless Threats and Key Management Issues. In: Wireless Next Generation Networks. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-11903-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11903-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11902-1

  • Online ISBN: 978-3-319-11903-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics