Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains

被引:0
|
作者
Dutta, Ratna [1 ]
Chang, Ee-Chien [2 ]
Mukhopadhyay, Sourav [2 ]
机构
[1] Inst Infocomm Res, Comp Div, Syst & Secur Dept, 21 Heng Mui Keng Terrace, Singapore 119613, Singapore
[2] Natl Univ Singapore, Sch Comp, Singapore 117548, Singapore
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS | 2007年 / 4521卷
关键词
sensor network; session key distribution; self-healing; revocation; computational security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security of group communication for large mobile wireless sensor network hinges on efficient key distribution and key management mechanism. As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed in the key distribution schemes. Therefore, self-healing is a good property for key distribution in wireless applications. The main idea of self-healing key distribution scheme is that even if during a certain session some broadcast messages are lost due to network faults, the users are capable of recovering lost session keys on their own, without requesting additional transmission from the group manager. The only requirement for a user to recover the lost session keys, is its membership in the group both before and after the sessions in which the broadcast packets containing the keys are sent. Self-healing approach of key distribution is stateless in the sense that a user who has been off-line for some period is able to recover the lost session keys immediately after coming back on-line. In this paper, we propose two constructions for scalable self-healing key distribution with t revocation capability. The novelty of our constructions are that we apply a different and more efficient self-healing mechanism compared to the ones in the literature using one-way key chain. The main improvements that our proposed schemes achieve over previous approaches are (a) communication bandwidth reduces from O((tj + j - t - 1) log q) to O ((t + 1) log q), and (b) computation costs for our first and second constructions reduce from O(2tj + j) to O(2t + 1) and O(2 (t(2) + t)) respectively, where m is the maximum number of sessions, j is the current session number, t is the maximum number of compromised group members that may collude and q is a large prime number. We achieve this result without any increase in the storage complexity. The schemes are scalable to very large groups in highly mobile, volatile and hostile network. We prove in an appropriate security framework that our constructions are computationally secure and achieve both forward secrecy and backward secrecy.
引用
收藏
页码:385 / +
页数:4
相关论文
共 50 条
  • [31] Design of self-healing key distribution schemes
    Blundo, C
    D'Arco, P
    De Santis, A
    Listo, M
    DESIGNS CODES AND CRYPTOGRAPHY, 2004, 32 (1-3) : 15 - 44
  • [32] On threshold self-healing key distribution schemes
    Sáez, G
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2005, 3796 : 340 - 354
  • [33] An Efficient and Sustainable Self-healing Protocol for Unattended Wireless Sensor Networks
    Chen, Juan
    Zhang, Hongli
    Fang, Binxing
    Du, Xiaojiang
    Yu, Haining
    Yu, Xiangzhan
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 5356 - 5361
  • [34] Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks
    Wang, Qiuhua
    Chen, Huifang
    Xie, Lei
    Wang, Kuang
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1363 - 1374
  • [35] Design of Self-Healing Key Distribution Schemes
    Carlo Blundo
    Paolo D’Arco
    Alfredo De Santis
    Massimiliano Listo
    Designs, Codes and Cryptography, 2004, 32 : 15 - 44
  • [36] Generalized self-healing key distribution using vector space access structure
    Dutta, Ratna
    Mukhopadhyay, Sourav
    Das, Amitabha
    Emmanuel, Sabu
    NETWORKING 2008: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, 4982 : 612 - +
  • [37] Self-Healing in Unattended Wireless Sensor Networks
    Di Pietro, Roberto
    Ma, Di
    Soriente, Claudio
    Tsudik, Gene
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2012, 9 (01)
  • [38] Towards Self-healing in Wireless Sensor Networks
    Bourdenas, Themistoklis
    Sloman, Morris
    SIXTH INTERNATIONAL WORKSHOP ON WEARABLE AND IMPLANTABLE BODY SENSOR NETWORKS, PROCEEDINGS, 2009, : 15 - 20
  • [39] A Survey of Group Key Distribution Schemes With Self-Healing Property
    Rams, Tomasz
    Pacyna, Piotr
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02): : 820 - 842
  • [40] Trade-Off between Collusion Resistance and User Life Cycle in Self-Healing Key Distributions with t-Revocation
    Dutta, Ratna
    Mukhopadhyay, Sourav
    Dowling, Tom
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 603 - +