A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks

被引:0
作者
Xiang, Guangli [1 ]
Yu, Lu [1 ]
Li, Beilei [1 ]
Xia, Mengsen [1 ]
机构
[1] Wuhan Univ Technol, Coll Comp Sci & Technol, Wuhan, Hubei, Peoples R China
来源
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017 | 2018年 / 10631卷
关键词
Mobile ad hoc network; Group key distribution; Dual directional hash chain; Self-healing; Resist collusion; WAY HASH CHAIN; COLLUSION RESISTANCE; REVOCATION;
D O I
10.1007/978-3-319-89500-0_29
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Group communication in mobile Ad Hoc network (MANET), because of its special characteristics of large-scale mobile nodes, frequent change and update of group members relationship, open and unstable communication channel and high rate of packets loss, making secure group communication in MANET face many security threats, so how to realize secure communication between mobile nodes and how to establish secure session keys shared between mobile nodes has been the focus of MANET. Aimed at the problem mentioned above, a group key distribution scheme based on three hash chains is proposed for MANET. This scheme introduces a self-healing hash chain based on Dual Directional Hash Chain(DDHC), when a node is revoked, the corresponding self-healing hash value will be replaced by a new random value, so that revoked nodes can not realize collusion attack with the newly added node; This scheme also takes into account the high rate of packet loss in MANET, and realizes self-healing property. The security and performance analysis shows that the scheme can meet the security requirements of group communication for MANET, and it has the characteristics of dynamic revocation and resists collusion. The scheme also reduces the storage overhead and the communication load to a large extent, and can meet the performance requirements of group communication for MANET.
引用
收藏
页码:325 / 335
页数:11
相关论文
共 21 条
[1]   Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks [J].
Chen, Huifang ;
Xie, Lei .
SENSORS, 2014, 14 (12) :24358-24380
[2]   Anti-collusive self-healing key distribution scheme with revocation capability [J].
Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin, 150001, China .
Inf. Technol. J., 2009, 4 (619-624) :619-624
[3]  
Du W, 2008, LECT NOTES COMPUT SC, V5324, P345, DOI 10.1007/978-3-540-88733-1_25
[4]  
Dutta R, 2007, IEEE WCNC, P2965
[5]   Computationally secure self-healing key distribution with revocation in wireless ad hoc networks [J].
Dutta, Ratna ;
Mukhopadhyay, Sourav ;
Collier, Martin .
AD HOC NETWORKS, 2010, 8 (06) :597-613
[6]   On the Security of a Self-Healing Group Key Distribution Scheme [J].
Guo, Hua ;
Zheng, Yandong .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) :1109-1121
[7]   Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks [J].
Guo, Hua ;
Zheng, Yandong ;
Zhang, Xiyong ;
Li, Zhoujun .
SENSORS, 2016, 16 (05)
[8]  
Liu D., 2003, P 10 ACM C COMP COMM, P231
[9]  
Qingyu Xu, 2008, Information Security Applications. 9th International Workshop, WISA 2008. Revised Selected Papers, P41
[10]   Self-healing key distribution with revocation [J].
Staddon, J ;
Miner, S ;
Franklin, M ;
Balfanz, D ;
Malkin, M ;
Dean, D .
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, :241-257