Constant storage self-healing key distribution with revocation in wireless sensor network

被引:22
作者
Dutta, Ratna [1 ]
Wu, Yong Dong [1 ]
Mukhopadhyay, Sourav [2 ]
机构
[1] Inst Infocomm Res, Syst & Secur Dept, 21 Heng Mui Keng Terrace, Singapore 119613, Singapore
[2] Natl Univ Singapore, Sch Comp, Singapore 117543, Singapore
来源
2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14 | 2007年
关键词
sensor network; session key distribution; self-healing; revocation; unconditional security; optimal storage overhead;
D O I
10.1109/ICC.2007.223
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The main property of self-healing ensures that the qualified users can recover the lost session keys on their own from the broadcast packets and some private information, without any additional communication with the group manager, thus decreasing the load on the group manager. The only requirement for a user to recover the lost session keys, is its membership in the group both before and after the sessions in which the broadcast packets containing the keys are sent. Self-healing approach of key distribution is stateless in the sense that a user who has been off-line for some period is able to recover the lost session keys immediately after coming back on-line. This paper presents a new self-healing key distribution scheme with revocation capability that requires constant storage of personal keys for each user and we feel, it is more efficient than the previous schemes in terms of communication complexity. The novelty of this scheme is to use a different and more efficient self-healing mechanism compared to the ones in the literature. The scheme is supported by a proper security analysis in an appropriate security model. It is unconditionally secure and achieves both forward and backward secrecy. Moreover, unlike previous works, proposed self-healing key distribution is not restricted to m sessions in Setup phase.
引用
收藏
页码:1323 / +
页数:2
相关论文
共 9 条
  • [1] Blundo C, 2004, LECT NOTES COMPUT SC, V3142, P234
  • [2] Design of self-healing key distribution schemes
    Blundo, C
    D'Arco, P
    De Santis, A
    Listo, M
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2004, 32 (1-3) : 15 - 44
  • [3] BLUNDO C, 1996, LNCS, V1109, P387, DOI DOI 10.1007/3-540-68697-5
  • [4] Cover TM, 2006, Elements of Information Theory
  • [5] Hong D, 2005, IEEE COMMUN LETT, V9, P759, DOI [10.1109/LCOMM.2005.1496607, 10.1109/LCOMM.2005.08015]
  • [6] Liu D., 2003, P 10 ACM C COMP COMM, P231, DOI DOI 10.1145/948109.948141
  • [7] More S. M., 2003, ACM WORKSH SURV SELF, P82, DOI DOI 10.1145/1036921.1036930
  • [8] Sáez G, 2005, LECT NOTES COMPUT SC, V3796, P340
  • [9] Self-healing key distribution with revocation
    Staddon, J
    Miner, S
    Franklin, M
    Balfanz, D
    Malkin, M
    Dean, D
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 241 - 257