Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks

被引:22
作者
Sun, Xinjiang [1 ]
Wu, Xiaobei [1 ]
Huang, Cheng [1 ]
Xu, Zhiliang [1 ]
Zhong, Jianlin [1 ,2 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Automat, Nanjing 210094, Jiangsu, Peoples R China
[2] Shanghai Key Lab Multiphase Flow & Heat Transfer, Shanghai 200093, Peoples R China
基金
国家教育部博士点专项基金资助;
关键词
Wireless sensor networks; Self-healing key management; Access polynomial; Sliding window; Broadcast authentication; Collusion resistance; REVOCATION; SECURITY;
D O I
10.1016/j.adhoc.2015.08.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Though lots of research results about self-healing key management under unreliable links have been proposed, there are still some shortcomings, such as the inefficiency of broadcasts, lack of broadcast authentication, limited sessions for key issues, disastrous risks of access polynomials, and the vulnerability of collusion attacks. In this paper, we propose two modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance. First, two kinds of attacks are introduced to break the security of access polynomials. Then, a modified security model is given, and collusion resistance capability is redefined from the perspective of session interval from node revocation to node addition, which does not depend on the number of collusive nodes. Next, based on sliding window and modified access polynomial, Sch-I and Sch-II are proposed to achieve the security and tolerate packet losses, which allow pairwise keys between member nodes and group manager to be updated dynamically. Finally, theoretical analysis validates that the proposed schemes have 8 self-healing capability, any-wise forward security and backward security, and enhanced collusion resistance capability, and can also avoid the flaws of access polynomials and reduce the resource consumption. Compared with existing schemes, they are quite suitable for practical applications. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:324 / 336
页数:13
相关论文
共 42 条
[1]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]  
Bao KH, 2011, LECT NOTES COMPUT SC, V6513, P221, DOI 10.1007/978-3-642-17955-6_16
[3]   Design of self-healing key distribution schemes [J].
Blundo, C ;
D'Arco, P ;
De Santis, A ;
Listo, M .
DESIGNS CODES AND CRYPTOGRAPHY, 2004, 32 (1-3) :15-44
[4]   On self-healing key distribution schemes [J].
Blundo, Carlo ;
D'Arco, Paolo ;
De Santis, Alfredo .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (12) :5455-5467
[5]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[6]  
Cover T. M., 2012, ELEMENTS INFORM THEO
[7]   Flaws in some self-healing key distribution schemes with revocation [J].
Daza, Vanesa ;
Herranz, Javier ;
Saez, German .
INFORMATION PROCESSING LETTERS, 2009, 109 (11) :523-526
[8]   Constant storage self-healing key distribution with revocation in wireless sensor network [J].
Dutta, Ratna ;
Wu, Yong Dong ;
Mukhopadhyay, Sourav .
2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, :1323-+
[9]  
Dutta R, 2007, LECT NOTES COMPUT SC, V4521, P385
[10]  
Dutta R, 2010, L N INST COMP SCI SO, V42, P13