Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks

被引:11
|
作者
Chen, Huifang [1 ,2 ]
Xie, Lei [1 ]
机构
[1] Zhejiang Univ, Dept Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
[2] Zhejiang Prov Key Lab Informat Network Technol, Hangzhou 310027, Zhejiang, Peoples R China
来源
SENSORS | 2014年 / 14卷 / 12期
基金
中国国家自然科学基金;
关键词
wireless networks; group communication; group key distribution; self-healing; collusion attack;
D O I
10.3390/s141224358
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks. We propose two improved SGKD schemes using the one-way hash chain (OHC) and the revocation polynomial (RP), the OHC&RP-SGKD schemes. In the proposed OHC&RP-SGKD schemes, by introducing the unique session identifier and binding the joining time with the capability of recovering previous session keys, the problem of the collusion attack between revoked users and new joined users in existing hash chain-based SGKD schemes is resolved. Moreover, novel methods for utilizing the one-way hash chain and constructing the personal secret, the revocation polynomial and the key updating broadcast packet are presented. Hence, the proposed OHC&RP-SGKD schemes eliminate the limitation of the maximum allowed number of revoked users on the maximum allowed number of sessions, increase the maximum allowed number of revoked/colluding users, and reduce the redundancy in the key updating broadcast packet. Performance analysis and simulation results show that the proposed OHC&RP-SGKD schemes are practical for resource-constrained wireless networks in bad environments, where a strong collusion attack resistance is required and many users could be revoked.
引用
收藏
页码:24358 / 24380
页数:23
相关论文
共 27 条
  • [1] Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks
    Wang, Qiuhua
    Chen, Huifang
    Xie, Lei
    Wang, Kuang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1363 - 1374
  • [2] One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks
    Wang, Qiuhua
    Chen, Huifang
    Xie, Lei
    Wang, Kuang
    [J]. AD HOC NETWORKS, 2013, 11 (08) : 2500 - 2511
  • [3] Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks
    Guo, Hua
    Zheng, Yandong
    Zhang, Xiyong
    Li, Zhoujun
    [J]. SENSORS, 2016, 16 (05)
  • [4] Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains
    Dutta, Ratna
    Chang, Ee-Chien
    Mukhopadhyay, Sourav
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 385 - +
  • [5] Improved self-healing key distribution with revocation in wireless sensor network
    Dutta, Ratna
    Mukhopadhyay, Sourav
    [J]. 2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 2965 - +
  • [6] A new public key certificate revocation scheme based on one-way hash chain
    Li, JF
    Zhu, YF
    Pan, H
    Wei, DW
    [J]. ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2005, 3739 : 670 - 675
  • [7] A Novel Key Pre-distribution Scheme Using One-way Hash Chain and Bivariate Polynomial for Wireless Sensor Networks
    Xu, Li
    Shen, Jinbo
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 575 - +
  • [8] Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
    Tian, Biming
    Han, Song
    Parvin, Sazia
    Hu, Jiankun
    Das, Sajal
    [J]. COMPUTER JOURNAL, 2011, 54 (04): : 549 - 569
  • [9] Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks
    Shi, Minghui
    Shen, Xuemin
    Jiang, Yixin
    Lin, Chuang
    [J]. IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 38 - 46
  • [10] Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks
    Bao, Kehua
    Zhang, Zhenfeng
    [J]. INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 221 - 233