Anti-collusive self-healing key distributions for wireless networks

被引:2
作者
Dutta, Ratna [1 ]
机构
[1] Department of Mathematics, Indian Institute of Technology Kharagpur, Kharagpur 721302, West Bengal
关键词
Collusion resistance; Computational security; Forward and backward secrecy; Revocation; Self-healing; Session key distribution; Wireless networks;
D O I
10.1504/IJWMC.2014.063055
中图分类号
学科分类号
摘要
We introduce three efficient anti-collusive self-healing key distribution schemes with t-revocation capability. Our proposed key distribution mechanism uses one-way hash chain. We obtain reduced storage, communication and computation costs over the previous approaches, which make our designs scalable to very large groups in highly mobile, volatile and hostile wireless networks. Our schemes are properly analysed in an appropriate security model and are proven to be computationally secure and achieve both forward and backward secrecy. Also our schemes can resist collusion between the newly joint users and the revoked users. Our set-up allows each user to choose its joining session at its will, whereas the session for user's revocation is pre-selected by the group manager. Unlike the existing self-healing key distribution schemes, rejoining of revoked users is permitted in our schemes at a later session with new identities. These features facilitate the group manager no longer to execute expensive traitor tracing mechanisms to keep track of individual compromised users. Copyright © 2014 Inderscience Enterprises Ltd.
引用
收藏
页码:362 / 377
页数:15
相关论文
共 50 条
[21]   Access Polynomial Based Self-healing Key Distribution with Improved Security and Performance [J].
Dutta, Ratna .
SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 :72-82
[22]   Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks [J].
Wang, Qiuhua ;
Chen, Huifang ;
Xie, Lei ;
Wang, Kuang .
SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) :1363-1374
[23]   Self-healing group key distribution with time-limited node revocation for wireless sensor networks [J].
Jiang, Yixin ;
Lin, Chuang ;
Shi, Minghui ;
Shen, Xuemin .
AD HOC NETWORKS, 2007, 5 (01) :14-23
[24]   Designing scalable self-healing key distribution schemes with revocation capability [J].
Dutta, Ratna ;
Mukhopadhyay, Sourav .
PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 :419-430
[25]   An Efficient Self-healing Key Distribution Scheme with Constant-size Personal Keys for Wireless Sensor Networks [J].
Han, Song ;
Tian, Biming ;
Zhang, Y. ;
Hu, J. .
2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
[26]   An Efficient and Sustainable Self-healing Protocol for Unattended Wireless Sensor Networks [J].
Chen, Juan ;
Zhang, Hongli ;
Fang, Binxing ;
Du, Xiaojiang ;
Yu, Haining ;
Yu, Xiangzhan .
2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, :5356-5361
[27]   Antilizer: Run Time Self-Healing Security for Wireless Sensor Networks [J].
Tomic, Ivana ;
Chen, Po-Yu ;
Breza, Michael J. ;
McCann, Julie A. .
PROCEEDINGS OF THE 15TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2018), 2018, :107-116
[28]   Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks [J].
Guo, Hua ;
Zheng, Yandong ;
Zhang, Xiyong ;
Li, Zhoujun .
SENSORS, 2016, 16 (05)
[29]   A key management scheme for tiered wireless sensor network with self-healing capability [J].
Wang, Maoyu ;
Tang, Helen ;
Yu, F. Richard .
GROUND/AIR MULTISENSOR INTEROPERABILITY, INTEGRATION, AND NETWORKING FOR PERSISTENT ISR IV, 2013, 8742
[30]   Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks [J].
Sun, Xinjiang ;
Wu, Xiaobei ;
Huang, Cheng ;
Xu, Zhiliang ;
Zhong, Jianlin .
AD HOC NETWORKS, 2016, 37 :324-336