Abstract
We focus on the problem of user revocation in secure adhoc networks. The current approach to achieve security in adhoc networks is to use a secret instantiation protocol in which, each user is given a subset of secrets from a common secret pool. To communicate securely, a pair of users use the secrets that are common to both of them. However, when users are compromised, some of these secrets are also compromised. Hence, to revoke the compromised users, the secrets known to these users need to be updated. Many group key management solutions exist for revocation of users from a group. However, due to the limitations in adhoc networks, i.e., lack of efficient broadcast mechanisms and lossy links, revocation of users is a challenging problem. In this paper, we propose a revocation algorithm that combines the secret instantiation protocols with group key management protocols. Depending on the combination of protocols used, our revocation algorithm provides deterministic or probabilistic guarantees for revocation. We illustrate our revocation algorithm by combining the square grid protocol and the logical key hierarchy protocol.
Keywords: Secure Adhoc Networks, User Revocation, Secret Instantiation Protocols, Group Key Management Protocols.
This work is partially sponsored by NSF CAREER 0092724, ONR grant N00014-01-1-0744, DARPA contract F33615-01-C-1901, and a grant from Michigan State University.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bruhadeshwar, B., Kulkarni, S.S. (2005). User Revocation in Secure Adhoc Networks. In: Chakraborty, G. (eds) Distributed Computing and Internet Technology. ICDCIT 2005. Lecture Notes in Computer Science, vol 3816. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11604655_43
Download citation
DOI: https://doi.org/10.1007/11604655_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30999-4
Online ISBN: 978-3-540-32429-4
eBook Packages: Computer ScienceComputer Science (R0)