Skip to main content

A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks

  • Conference paper
Book cover Network and System Security (NSS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8792))

Included in the following conference series:

Abstract

As sensor nodes are deployed in an open and hostile environment, they are vulnerable to various attacks. It is of critical importance to be able to revoke compromised nodes in order to ensure the confidentiality of data traversing in the network. In this work, we propose a novel key revocation scheme which is a hybrid of centralized and distributed methods. The design of our scheme is based on Chan et al. (2005) but eliminates the requirement of prior knowledge. It mainly consists of a voting procedure among nodes and a global revocation by the base station. We also modify existing distributed revocation properties in Chan et al. (2005)’s protocol and extend them to key revocation properties of any hybrid schemes based on the voting process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Information Security and Cryptography. Springer (2003)

    Google Scholar 

  2. Chan, H., Gligor, V.D., Perrig, A., Muralidharan, G.: On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Transactions on Dependable and Secure Computing 2(3), 233–247 (2005)

    Article  Google Scholar 

  3. Chao, C.H., Yang, C.F., Lin, P.T., Li, J.S.: Novel Distributed Key Revocation Scheme for Wireless Sensor Networks. Security and Communication Networks 6(10), 1271–1280 (2013)

    Google Scholar 

  4. Choo, K.K.R.: Secure Key Establishment. Advances in Information Security, vol. 41. Springer (2009)

    Google Scholar 

  5. Choo, K.K.R., Boyd, C., Hitchcock, Y.: The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun Protocols. Computer Communications 29(15), 2788–2797 (2006)

    Article  Google Scholar 

  6. Jiang, Y., Shi, H.: A key Pre-distribution Scheme for Wireless Sensor Networks Using Hexagonal Deployment Knowledge. Chinese Journal of Electronics 17(3), 520–525 (2008)

    Google Scholar 

  7. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  8. Liu, D., Ning, P.: Multi-level μTESLA: Broadcast authentication for distributed sensor networks. Trans. on Embedded Computing Sys. 3(4), 800–836 (2004)

    Article  MathSciNet  Google Scholar 

  9. Chattopadhyay, S., Turuk, A.K.: A Scheme for Key Revocation in Wireless Sensor Networks. International Journal on Advanced Computer Engineering and Communication Technology 1(2), 16–20 (2012)

    Google Scholar 

  10. Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: ACM Conference on Computer and Communication Security, pp. 41–47 (2002)

    Google Scholar 

  11. Wang, Y., Ramamurthy, B., Zou, X.: KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks. In: International Conference on Communications, pp. 1260–1265 (2007)

    Google Scholar 

  12. Park, C.H., Zhang, Y.Y., Kim, I.T., Park, M.S.: DLS: Dynamic Level Session Key Revocation Protocol for Wireless Sensor Networks. In: 2010 International Conference Information Science and Applications (ICISA), pp. 1–8 (2010)

    Google Scholar 

  13. Zeng, P., Cao, Z., Choo, K.K.R., Wang, S.: Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks. IEEE Communications Letters 13(6), 426–428 (2009)

    Article  Google Scholar 

  14. Zeng, P., Cao, Z., Choo, K.K.R., Sun, D.: On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks. IEEE Transactions on Consumer Electronics 56(2), 566–569 (2010)

    Article  Google Scholar 

  15. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, pp. 197–213 (2013)

    Google Scholar 

  16. Jiang, Y., Zhang, R.N., Du, X.J.: A New Efficient Random Key Revocation Protocol for Wireless Sensor Networks. In: 14th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2013 (2013)

    Google Scholar 

  17. Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: ACM Conference on Computer and Communication Security, pp. 52–61 (2003)

    Google Scholar 

  18. Blom, R.: An optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  19. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis and Defenses. In: Third International Workshop on Information Processing in Sensor Networks, IPSN (2004)

    Google Scholar 

  20. Sánchez, D.S., Baldus, H.: Key Management for Mobile Sensor Networks. In: Burmester, M., Yasinsac, A. (eds.) MADNES 2005. LNCS, vol. 4074, pp. 14–26. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  21. Moore, T., Clulow, J.: Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 157–168. Springer, Boston (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Ge, M., Choo, KK.R. (2014). A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks. In: Au, M.H., Carminati, B., Kuo, CC.J. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science, vol 8792. Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11698-3_35

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11697-6

  • Online ISBN: 978-3-319-11698-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics