Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains

被引:0
|
作者
Dutta, Ratna [1 ]
Chang, Ee-Chien [2 ]
Mukhopadhyay, Sourav [2 ]
机构
[1] Inst Infocomm Res, Comp Div, Syst & Secur Dept, 21 Heng Mui Keng Terrace, Singapore 119613, Singapore
[2] Natl Univ Singapore, Sch Comp, Singapore 117548, Singapore
关键词
sensor network; session key distribution; self-healing; revocation; computational security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security of group communication for large mobile wireless sensor network hinges on efficient key distribution and key management mechanism. As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed in the key distribution schemes. Therefore, self-healing is a good property for key distribution in wireless applications. The main idea of self-healing key distribution scheme is that even if during a certain session some broadcast messages are lost due to network faults, the users are capable of recovering lost session keys on their own, without requesting additional transmission from the group manager. The only requirement for a user to recover the lost session keys, is its membership in the group both before and after the sessions in which the broadcast packets containing the keys are sent. Self-healing approach of key distribution is stateless in the sense that a user who has been off-line for some period is able to recover the lost session keys immediately after coming back on-line. In this paper, we propose two constructions for scalable self-healing key distribution with t revocation capability. The novelty of our constructions are that we apply a different and more efficient self-healing mechanism compared to the ones in the literature using one-way key chain. The main improvements that our proposed schemes achieve over previous approaches are (a) communication bandwidth reduces from O((tj + j - t - 1) log q) to O ((t + 1) log q), and (b) computation costs for our first and second constructions reduce from O(2tj + j) to O(2t + 1) and O(2 (t(2) + t)) respectively, where m is the maximum number of sessions, j is the current session number, t is the maximum number of compromised group members that may collude and q is a large prime number. We achieve this result without any increase in the storage complexity. The schemes are scalable to very large groups in highly mobile, volatile and hostile network. We prove in an appropriate security framework that our constructions are computationally secure and achieve both forward secrecy and backward secrecy.
引用
收藏
页码:385 / +
页数:4
相关论文
共 50 条
  • [31] A New Efficient Random Key Revocation Protocol for Wireless Sensor Networks
    Jiang, Yi
    Zhang, Ruonan
    Du, Xiaojiang
    2013 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT), 2013, : 233 - 238
  • [32] An efficient key distribution scheme with self-healing property
    Hong, D
    Kang, JS
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (08) : 759 - 761
  • [33] An improved efficient self-healing group key distribution
    Sun, HB
    Lin, DD
    Xue, R
    INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 185 - 189
  • [34] An Efficient Self-healing Group Key Management with Lower Storage for Wireless Sensor Network
    Zhang, Caixia
    Qu, Lili
    Wang, Xiangdong
    Xiong, Jianbin
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND MECHANICAL AUTOMATION (CSMA), 2015, : 124 - 128
  • [35] Anti-collusive self-healing key distribution scheme with revocation capability
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin, 150001, China
    Inf. Technol. J., 2009, 4 (619-624): : 619 - 624
  • [36] An Efficient Self-healing Scheme for Wireless Sensor Networks
    Wan, Jian
    Chen, Wanyong
    Xu, Xianghua
    Fang, Miaoqi
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 96 - 99
  • [37] Secure Key Renewal and Revocation for Wireless Sensor Networks
    Mansour, Ismail
    Chalhoub, Gerard
    Lafourcade, Pascal
    Delobel, Francois
    2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2014, : 382 - 385
  • [38] Survey on key revocation mechanisms in wireless sensor networks
    Ge, Mengmeng
    Choo, Kim-Kwang Raymond
    Wu, Huai
    Yu, Yong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 63 : 24 - 38
  • [39] Efficient Key Distribution Protocol for Wireless Sensor Networks
    Alshammari, Majid R.
    Elleithy, Khaled M.
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 980 - 985
  • [40] Key PIT-distribution Scheme with Node Revocation for Wireless Sensor Networks
    Yan, Junzhi
    Ma, Jianfeng
    Li, Fenghua
    Moon, SangJae
    AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10 (2-3) : 235 - 251