Skip to main content

Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network

  • Conference paper
Mobile Ad-Hoc and Sensor Networks (MSN 2007)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4864))

Included in the following conference series:

Abstract

In this paper we discuss the uprising problem of public key revocation. The main problem in key revocation includes the relatively large memory and communication required to store and transmit the revoked list of keys. This problem becomes serious as the sensor network is subjected to several constraints. In this paper, we introduce several efficient representation mechanisms for representing a set of revoked identifiers of keys. We discuss several network and revocation scenarios and introduce the corresponding solution for each. To demonstrate the value of our proposed approaches, practical simulation results and several comparisons with the current used revocation mechanism are included.

This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Advancement)(IITA-2006-C1090-0603-0028).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Deng, J., Han, R., Mishra, S.: Defending against path-based dos attacks in wireless sensor networks. In: SASN, pp. 89–96 (2005)

    Google Scholar 

  2. Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, p. 197 (2003)

    Google Scholar 

  3. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM (2004)

    Google Scholar 

  4. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM CCS, pp. 41–47 (2002)

    Google Scholar 

  5. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: ACM CCS, pp. 52–61 (2003)

    Google Scholar 

  6. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key crypto-systems. CACM 26, 96–99 (1983)

    Google Scholar 

  7. Koblitz, N., Menezes, A., Vanstone, S.A.: The state of elliptic curve cryptography. Des. Codes Cryptography 19, 173–193 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  8. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: CHES, pp. 119–132 (2004)

    Google Scholar 

  9. Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: First IEEE Int. Conf. on Sensor and Ad Hoc Comm. and Networks, pp. 71–80 (2004)

    Google Scholar 

  10. Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: PerCom, pp. 324–328 (2005)

    Google Scholar 

  11. Watro, R.J., Kong, D., fenCuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: SASN, pp. 59–64 (2004)

    Google Scholar 

  12. Du, W., Wang, R., Ning, P.: An efficient scheme for authenticating public keys in sensor networks. In: MobiHoc, pp. 58–67 (2005)

    Google Scholar 

  13. Nyang, D., Mohaisen, A.: Cooperative public key authentication protocol in wireless sensor network. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 864–873. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Pottie, G.J., Kaiser, W.J.: Wireless integrated network sensors. Commun. ACM 43, 51–58 (2000)

    Article  Google Scholar 

  15. Housley, R., Polk, W., Ford, W., Solo, D.: Rfc 3280: Internet x.509 public key infrastructure: Certificate and certificate revocation list (crl) profile (2002)

    Google Scholar 

  16. Levis, P., Madden, S., Gay, D., Polastre, J., Szewczyk, R., Woo, A., Brewer, E.A., Culler, D.E.: The emergence of networking abstractions and techniques in tinyos. In: NSDI, pp. 1–14 (2004)

    Google Scholar 

  17. Ning, P., An Liu, P.K.: Tinyecc: Elliptic curve cryptography for sensor networks (version 0.3), software package (2007)

    Google Scholar 

  18. Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE S&P, pp. 122–134 (1980)

    Google Scholar 

  19. Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  20. Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)

    Google Scholar 

  21. Golomb, S.W., Peile, R.E., Scholtz, R.A.: Basic Concepts in Information Theory and Coding: The Adventures of Secret Agent 00111. Springer, Heidelberg (1994)

    MATH  Google Scholar 

  22. Trivedi, K.S.: Probability and Statistics with Reliability, Queuing and Computer Science Applications. John Wiley and Sons Inc, New York, USA (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hongke Zhang Stephan Olariu Jiannong Cao David B. Johnson

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mohaisen, A., Nyang, D., Maeng, Y., Lee, K. (2007). Structures for Communication-Efficient Public Key Revocation in Ubiquitous Sensor Network. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds) Mobile Ad-Hoc and Sensor Networks. MSN 2007. Lecture Notes in Computer Science, vol 4864. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77024-4_74

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77024-4_74

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77023-7

  • Online ISBN: 978-3-540-77024-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics