Abstract
Security is one of the core concerns in group communication in wireless sensor networks (WSNs). Secure group key management schemes are responsible for secure distribution of group keys among valid nodes in a group. We are representing a secure group re-keying scheme with compromised nodes revocation in WSNs. This scheme represents function of joining and leaving of nodes in a group. As WSNs are exposed to threats, so compromised node revocation is a challenging task. Our main focus is revocation of compromised nodes from a group without re-grouping. And also when a compromised node is revoked; it is unable to join any new group in future. In the scheme, we are updating the pre-deployed keys as well as current group keying material. Thus compromised node is unable to continue with current and future groups. Scheme is examined for verification of its computational and security requirement.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wang, Y., Ramamurthy, B.: Group rekeying schemes for secure group communication in wireless sensor networks. In: IEEE International Conference on Communications, 2007. ICC 2007, pp. 3419–3424 (2007)
Kausar, F., Hussain, S., Park, J.-H., Masood, A.: Secure group communication with self-healing and rekeying in wireless sensor networks. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds.) MSN 2007. LNCS, vol. 4864, pp. 737–748. Springer, Heidelberg (2007)
Kaya, T., Lin, G., Yilmaz, G.N.: A.: Secure multicast groups on ad hoc networks. In: SASN 2003: Proceedings of the 1st ACM work-shop on Security of ad hoc and sensor networks, Fairfax, Virginia, pp. 94–102. ACM Press, New York (2003)
Uzun, E.: Survey report on group key distribution schemes for secure multicast in mobile ad hoc networks (2004)
Chiang, T.C., Huang, Y.M.: Group keys and the multicast security in ad hoc networks. In: Parallel Processing Workshops, International Conference on Parallel processing, p. 385 (2003)
Zhu, S., Setia, S., Xu, S., Jajodia, S.: Gkmpan: An efficient group rekeying scheme for secure multicast in ad-hoc networks. In: Proc. of Mobiquitos 2004, pp. 42–51. IEEE, Los Alamitos (2004)
Hu, G., Kuang, X., Gong, Z.: A cluster-based group rekeying algorithm in mobile ad hoc networks. In: ICCNMC, pp. 344–353 (2005)
Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 68–79 (1998)
Yang, Y.R., Li, X.S., Zhang, X.B., Lam, S.S.: Reliable group rekeying: a performance analysis. In: Proceedings of ACM SIGCOMM 2001, pp. 27–38 (2001)
Jiang, Y., Lin, C., Shi, M., Shen, X.: Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Networks 5(1), 14–23 (2007)
Liu, D., Ning, P., Sun, K.: Efficient self-healing group key distribution with revocation capability. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 231–240 (2003)
Dutta, R., Chang, E.-C., Mukhopadhyay, S.: Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 385–400. Springer, Heidelberg (2007)
Wang, Y., Ramamurthy, B., Xue, Y.: A key management protocol for wireless sensor networks with multiple base stations. In: ICC, pp. 1625–1629. IEEE, Los Alamitos (2008)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: Spins: Security protocols for sensor networks. Wireless Networks, 189–199 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khalid, A., Hussain, M. (2009). A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_72
Download citation
DOI: https://doi.org/10.1007/978-3-642-02617-1_72
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02616-4
Online ISBN: 978-3-642-02617-1
eBook Packages: Computer ScienceComputer Science (R0)