Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Resilience Against Node Capture

Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization
Defines the security strength of KMS in presence of adversaries. It is the probability of key not getting compromised when x nodes are captured by the adversary in a network.
Published in Chapter:
Key Management in WSN Security: An Attacker's Perspective
Priyanka Ahlawat (National Institute of Technology, Kurukshetra, India) and Mayank Dave (National Institute of Technology, Kurukshetra, India)
DOI: 10.4018/978-1-5225-7335-7.ch015
Abstract
To create a secure communication among the sensor nodes, a key establishment scheme is very important. Wireless sensor networks (WSN) are usually left unattended and thus may attract the adversary to launch several attacks to the network operation. The exposure of the key during a node capture may disturb a large part of network communication. If there is a reliable, efficient, and secure KMS, disruption in the network to such an extent may not occur during a node capture attack. Several researchers have presented several key agreement schemes, but still the area is open to design an efficient attack resistant KMS. Sometimes, during the design of security protocols, the assumptions taken for the adversary behavior in sensor field may not reflect their actual behavior of the adversary in sensor field making these schemes less feasible in many real-world WSN applications. This chapter first discusses the challenges and security requirements, node capture attacks, its impact on the network, and some open issues of KMS solutions to this problem.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR