A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks

被引:0
|
作者
Xiang, Guangli [1 ]
Yu, Lu [1 ]
Li, Beilei [1 ]
Xia, Mengsen [1 ]
机构
[1] Wuhan Univ Technol, Coll Comp Sci & Technol, Wuhan, Hubei, Peoples R China
关键词
Mobile ad hoc network; Group key distribution; Dual directional hash chain; Self-healing; Resist collusion; WAY HASH CHAIN; COLLUSION RESISTANCE; REVOCATION;
D O I
10.1007/978-3-319-89500-0_29
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Group communication in mobile Ad Hoc network (MANET), because of its special characteristics of large-scale mobile nodes, frequent change and update of group members relationship, open and unstable communication channel and high rate of packets loss, making secure group communication in MANET face many security threats, so how to realize secure communication between mobile nodes and how to establish secure session keys shared between mobile nodes has been the focus of MANET. Aimed at the problem mentioned above, a group key distribution scheme based on three hash chains is proposed for MANET. This scheme introduces a self-healing hash chain based on Dual Directional Hash Chain(DDHC), when a node is revoked, the corresponding self-healing hash value will be replaced by a new random value, so that revoked nodes can not realize collusion attack with the newly added node; This scheme also takes into account the high rate of packet loss in MANET, and realizes self-healing property. The security and performance analysis shows that the scheme can meet the security requirements of group communication for MANET, and it has the characteristics of dynamic revocation and resists collusion. The scheme also reduces the storage overhead and the communication load to a large extent, and can meet the performance requirements of group communication for MANET.
引用
收藏
页码:325 / 335
页数:11
相关论文
共 50 条
  • [41] Efficient long-lived self-healing key distribution scheme
    Li, Hui
    Wu, Chuan-Kun
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 462 - 468
  • [42] An Authenticated Self-Healing Key Distribution Scheme Based on Bilinear Pairings
    Tian, Biming
    Chang, Elizabeth
    Dillon, Tharam S.
    Han, Song
    Hussain, Farookh K.
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1061 - 1065
  • [43] Multipath routing with self-healing technique for quality of service (QoS) support in mobile ad-hoc networks (MANET)
    Bhagyaveni, MA
    Shanmugavet, S
    Balaji, AS
    Balasubramanian
    PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 91 - 102
  • [44] A More Efficient Group Key Distribution Scheme for Wireless Ad hoc Networks
    李晖
    陈克非
    温蜜
    郑燕飞
    Journal of Shanghai Jiaotong University, 2008, (01) : 64 - 66
  • [45] More efficient group key distribution scheme for wireless ad hoc networks
    Li H.
    Chen K.-F.
    Wen M.
    Zheng Y.-F.
    Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) : 64 - 66
  • [46] Self-healing key distribution with revocation
    Staddon, J
    Miner, S
    Franklin, M
    Balfanz, D
    Malkin, M
    Dean, D
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 241 - 257
  • [47] On self-healing key distribution schemes
    Blundo, Carlo
    D'Arco, Paolo
    De Santis, Alfredo
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (12) : 5455 - 5467
  • [48] Probabilistic distributed key pre-distribution for mobile ad hoc networks
    Chan, ACF
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 3743 - 3747
  • [49] Analysis of Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
    Dahshan, Hisham
    Irvine, James
    2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 538 - 542
  • [50] A Self-healing Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks
    Messai, Mohamed-Lamine
    Seba, Hamida
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 144 - 151