Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks

被引:9
|
作者
Guo, Hua [1 ,3 ]
Zheng, Yandong [1 ]
Zhang, Xiyong [2 ]
Li, Zhoujun [1 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100000, Peoples R China
[2] State Key Lab Math Engn & Adv Comp, Wuxi 214000, Peoples R China
[3] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100000, Peoples R China
基金
中国国家自然科学基金;
关键词
wireless networks; self-healing group key distribution; exponential arithmetic; backward secrecy; REVOCATION; MANAGEMENT;
D O I
10.3390/s16050609
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In resource-constrained wireless networks, resources such as storage space and communication bandwidth are limited. To guarantee secure communication in resource-constrained wireless networks, group keys should be distributed to users. The self-healing group key distribution (SGKD) scheme is a promising cryptographic tool, which can be used to distribute and update the group key for the secure group communication over unreliable wireless networks. Among all known SGKD schemes, exponential arithmetic based SGKD (E-SGKD) schemes reduce the storage overhead to constant, thus is suitable for the the resource-constrained wireless networks. In this paper, we provide a new mechanism to achieve E-SGKD schemes with backward secrecy. We first propose a basic E-SGKD scheme based on a known polynomial-based SGKD, where it has optimal storage overhead while having no backward secrecy. To obtain the backward secrecy and reduce the communication overhead, we introduce a novel approach for message broadcasting and self-healing. Compared with other E-SGKD schemes, our new E-SGKD scheme has the optimal storage overhead, high communication efficiency and satisfactory security. The simulation results in Zigbee-based networks show that the proposed scheme is suitable for the resource-restrained wireless networks. Finally, we show the application of our proposed scheme.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] Efficient Threshold Self-Healing Key Distribution with Sponsorization for Infrastructureless Wireless Networks
    Han, Song
    Tian, Biming
    He, Mingxing
    Chang, Elizabeth
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (04) : 1876 - 1887
  • [22] Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks
    Bao, Kehua
    Zhang, Zhenfeng
    [J]. INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 221 - 233
  • [23] Self-healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks
    Yuan, Ting
    Ma, Jianqing
    Zhong, Yiping
    Zhang, Shiyong
    [J]. 2008 INTERNATIONAL MULTISYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS), 2008, : 83 - 90
  • [24] An Authenticated Self-Healing Key Distribution Scheme Based on Bilinear Pairings
    Tian, Biming
    Chang, Elizabeth
    Dillon, Tharam S.
    Han, Song
    Hussain, Farookh K.
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1061 - 1065
  • [25] An Efficient Self-healing Key Distribution Scheme with Constant-size Personal Keys for Wireless Sensor Networks
    Han, Song
    Tian, Biming
    Zhang, Y.
    Hu, J.
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
  • [26] Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks
    Du, Wei
    He, Mingxing
    [J]. PROVABLE SECURITY, 2008, 5324 : 345 - 359
  • [27] Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
    Yang, Yanjiang
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 135 - +
  • [28] A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks
    Du, Wei
    He, Mingxing
    Li, Xiao
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2009, 5574 : 832 - 843
  • [29] An Efficient Self-healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks
    Gu, Jie
    Xue, Zhi
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
  • [30] Computationally secure self-healing key distribution with revocation in wireless ad hoc networks
    Dutta, Ratna
    Mukhopadhyay, Sourav
    Collier, Martin
    [J]. AD HOC NETWORKS, 2010, 8 (06) : 597 - 613