Anti-collusive self-healing key distributions for wireless networks

被引:2
|
作者
Dutta, Ratna [1 ]
机构
[1] Department of Mathematics, Indian Institute of Technology Kharagpur, Kharagpur 721302, West Bengal
关键词
Collusion resistance; Computational security; Forward and backward secrecy; Revocation; Self-healing; Session key distribution; Wireless networks;
D O I
10.1504/IJWMC.2014.063055
中图分类号
学科分类号
摘要
We introduce three efficient anti-collusive self-healing key distribution schemes with t-revocation capability. Our proposed key distribution mechanism uses one-way hash chain. We obtain reduced storage, communication and computation costs over the previous approaches, which make our designs scalable to very large groups in highly mobile, volatile and hostile wireless networks. Our schemes are properly analysed in an appropriate security model and are proven to be computationally secure and achieve both forward and backward secrecy. Also our schemes can resist collusion between the newly joint users and the revoked users. Our set-up allows each user to choose its joining session at its will, whereas the session for user's revocation is pre-selected by the group manager. Unlike the existing self-healing key distribution schemes, rejoining of revoked users is permitted in our schemes at a later session with new identities. These features facilitate the group manager no longer to execute expensive traitor tracing mechanisms to keep track of individual compromised users. Copyright © 2014 Inderscience Enterprises Ltd.
引用
收藏
页码:362 / 377
页数:15
相关论文
共 50 条
  • [1] Computationally secure self-healing key distribution with revocation in wireless ad hoc networks
    Dutta, Ratna
    Mukhopadhyay, Sourav
    Collier, Martin
    AD HOC NETWORKS, 2010, 8 (06) : 597 - 613
  • [2] Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
    Tian, Biming
    Han, Song
    Parvin, Sazia
    Hu, Jiankun
    Das, Sajal
    COMPUTER JOURNAL, 2011, 54 (04) : 549 - 569
  • [3] Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains
    Dutta, Ratna
    Chang, Ee-Chien
    Mukhopadhyay, Sourav
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 385 - +
  • [4] Improved self-healing key distribution with revocation in wireless sensor network
    Dutta, Ratna
    Mukhopadhyay, Sourav
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 2965 - +
  • [5] Trade-Off between Collusion Resistance and User Life Cycle in Self-Healing Key Distributions with t-Revocation
    Dutta, Ratna
    Mukhopadhyay, Sourav
    Dowling, Tom
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 603 - +
  • [6] Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications
    Guo, Hua
    Zheng, Yandong
    Li, Xiong
    Li, Zhoujun
    Xia, Chunhe
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 713 - 721
  • [7] Self-healing wireless sensor networks
    Miyaji, Atsuko
    Omote, Kazumasa
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (10) : 2547 - 2568
  • [8] A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks
    Xiang, Guangli
    Yu, Lu
    Li, Beilei
    Xia, Mengsen
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 325 - 335
  • [9] Constant storage self-healing key distribution with revocation in wireless sensor network
    Dutta, Ratna
    Wu, Yong Dong
    Mukhopadhyay, Sourav
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1323 - +
  • [10] Efficient Threshold Self-Healing Key Distribution with Sponsorization for Infrastructureless Wireless Networks
    Han, Song
    Tian, Biming
    He, Mingxing
    Chang, Elizabeth
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (04) : 1876 - 1887