%0 Conference Proceedings %T Security of the Multiple-Key Blom’s Key Agreement Scheme for Sensor Networks %+ Auckland University of Technology (AUT) %A Yang, Mee, Loong %A Anbuky, Adnan, Al %A Liu, William %Z Part 2: Data Security %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 29th IFIP International Information Security Conference (SEC) %C Marrakech, Morocco %Y Nora Cuppens-Boulahia %Y Frédéric Cuppens %Y Sushil Jajodia %Y Anas Abou El Kalam %Y Thierry Sans %I Springer %3 ICT Systems Security and Privacy Protection %V AICT-428 %P 66-79 %8 2014-06-02 %D 2014 %R 10.1007/978-3-642-55415-5_6 %Z Computer Science [cs]Conference papers %X The security of the Multiple-Key Blom’s (MKB) key agreement scheme is analysed. We considered how the scheme may be broken by a very powerful and well resourced adversary who is able to capture any number of nodes to extract all the sensitive keying material. We showed that by choosing suitable keying parameters, the captured private keys cannot be used directly to break the scheme. Each captured key must first be correctly associated with the public key and master key used to compute it. The chances of finding this private-public-master-key association (PPMka) can be made extremely small and would require the attacker to capture a very large number of nodes, or try an extremely large number of possible solutions. This allows the scheme to be secure for use in large networks, overcoming the limitations in the original Blom’s scheme. We obtained some analytical results and compared them to those from computer simulated attacks on the scheme. %G English %Z TC 11 %2 https://inria.hal.science/hal-01370354/document %2 https://inria.hal.science/hal-01370354/file/978-3-642-55415-5_6_Chapter.pdf %L hal-01370354 %U https://inria.hal.science/hal-01370354 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-AICT-428 %~ IFIP-TC11 %~ IFIP-SEC