Skip to main content

Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks

  • Conference paper
Book cover Provable Security (ProvSec 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5324))

Included in the following conference series:

Abstract

In this paper, we analyze an existing constant storage self-healing key distribution scheme in wireless sensor networks. Then, we show two attacks and propose a modified scheme to overcome the two flaws. At last, we propose a new self-healing key distribution scheme to improve the modified scheme. The most prominent properties of the new proposed scheme are as follows: achieving forward and backward secrecy and resisting to a collusion attack. So that a revoked user with the assistance of the newly joined users cannot get any information of group session keys which it is not entitled to get.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Camtepe, S., Yener, B.: Key Distribution Mechanisms for Wireless Sensor Networks: A Survey. Technical Report, TR-05-07, Rensselaer Polytechnic Institute (2005)

    Google Scholar 

  2. Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing Key Distribution with Revocation. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 241–257 (2002)

    Google Scholar 

  3. Liu, D., Ning, P., Sun, K.: Efficient Self-healing Group Key Distribution with Revocation Capability. In: Proceedings of the 10th ACM conference on Computer and Communications Security, New York, pp. 2003–231 (2003)

    Google Scholar 

  4. More, S., Malkin, M., Staddon, J.: Sliding-window Self-healing Key Distribution with Revocation. In: ACM Workshop on Survivable and Self-regenerative Systems (2003)

    Google Scholar 

  5. Blundo, C., Darco, P., Santis, A.D., Listo, M.: Design of Self-healing Key Distribution Schemes. Des. Codes Cryptography (2004)

    Google Scholar 

  6. Blundo, C.: Randomness in Self-Healing Key Distribution Schemes. Theory and Practice in Information-Theoretic Security, 80–84 (2005)

    Google Scholar 

  7. Blundo, C., D’Arco, P., Listo, M.: A Flaw in a Self-Healing Key Distribution Scheme. In: Proceedings of Information Theory Workshop, Paris, pp. 163–166 (2003)

    Google Scholar 

  8. Blundo, C., D’Arco, P., Santis, A., Listo, M.: Definitions and Bounds for Self-healing Key Distribution. In: Díaz, J., Karhumäki, J., Lepistö, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol. 3142, pp. 234–245. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Hong, D., Kang, J.: An Efficient Key Distribution Scheme with Selfhealing Property. IEEE Communication Letters 9, 759–761 (2005)

    Article  Google Scholar 

  10. Dutta, R., Wu, Y., Mukhopadhyay, S.: Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network. In: IEEE International Conference on Communications, 2007, pp. 1323–1332 (2007)

    Google Scholar 

  11. Shamir, A.: How to share a secret. Communications of ACM 22, 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  12. Xukai, Z., Yuan-Shun, D.: A Robust and Stateless Self-Healing Group Key Management Scheme. In: International Conference on Communication Technology, pp. 1–4 (2006)

    Google Scholar 

  13. Dutta, R., Chang, E., Mukhopadhyay, S.: Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Hash Chains. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 385–400. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Chadha, A., Yonghe, L., Das, S.K.: Group Key Distribution Via Local Collaboration in Wireless Sensor Networks. In: Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, pp. 46–54 (2005)

    Google Scholar 

  15. Biming, T., Mingxing, H.: A Self-healing Key Distribution Scheme with Novel Properties. International Journal of Network Security 7(1), 115–120 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Du, W., He, M. (2008). Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds) Provable Security. ProvSec 2008. Lecture Notes in Computer Science, vol 5324. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88733-1_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88733-1_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88732-4

  • Online ISBN: 978-3-540-88733-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics