Skip to main content

A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks

  • Conference paper
Advances in Information Security and Assurance (ISA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5576))

Included in the following conference series:

Abstract

Security is one of the core concerns in group communication in wireless sensor networks (WSNs). Secure group key management schemes are responsible for secure distribution of group keys among valid nodes in a group. We are representing a secure group re-keying scheme with compromised nodes revocation in WSNs. This scheme represents function of joining and leaving of nodes in a group. As WSNs are exposed to threats, so compromised node revocation is a challenging task. Our main focus is revocation of compromised nodes from a group without re-grouping. And also when a compromised node is revoked; it is unable to join any new group in future. In the scheme, we are updating the pre-deployed keys as well as current group keying material. Thus compromised node is unable to continue with current and future groups. Scheme is examined for verification of its computational and security requirement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wang, Y., Ramamurthy, B.: Group rekeying schemes for secure group communication in wireless sensor networks. In: IEEE International Conference on Communications, 2007. ICC 2007, pp. 3419–3424 (2007)

    Google Scholar 

  2. Kausar, F., Hussain, S., Park, J.-H., Masood, A.: Secure group communication with self-healing and rekeying in wireless sensor networks. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds.) MSN 2007. LNCS, vol. 4864, pp. 737–748. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Kaya, T., Lin, G., Yilmaz, G.N.: A.: Secure multicast groups on ad hoc networks. In: SASN 2003: Proceedings of the 1st ACM work-shop on Security of ad hoc and sensor networks, Fairfax, Virginia, pp. 94–102. ACM Press, New York (2003)

    Google Scholar 

  4. Uzun, E.: Survey report on group key distribution schemes for secure multicast in mobile ad hoc networks (2004)

    Google Scholar 

  5. Chiang, T.C., Huang, Y.M.: Group keys and the multicast security in ad hoc networks. In: Parallel Processing Workshops, International Conference on Parallel processing, p. 385 (2003)

    Google Scholar 

  6. Zhu, S., Setia, S., Xu, S., Jajodia, S.: Gkmpan: An efficient group rekeying scheme for secure multicast in ad-hoc networks. In: Proc. of Mobiquitos 2004, pp. 42–51. IEEE, Los Alamitos (2004)

    Google Scholar 

  7. Hu, G., Kuang, X., Gong, Z.: A cluster-based group rekeying algorithm in mobile ad hoc networks. In: ICCNMC, pp. 344–353 (2005)

    Google Scholar 

  8. Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 68–79 (1998)

    Google Scholar 

  9. Yang, Y.R., Li, X.S., Zhang, X.B., Lam, S.S.: Reliable group rekeying: a performance analysis. In: Proceedings of ACM SIGCOMM 2001, pp. 27–38 (2001)

    Google Scholar 

  10. Jiang, Y., Lin, C., Shi, M., Shen, X.: Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Networks 5(1), 14–23 (2007)

    Article  Google Scholar 

  11. Liu, D., Ning, P., Sun, K.: Efficient self-healing group key distribution with revocation capability. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 231–240 (2003)

    Google Scholar 

  12. Dutta, R., Chang, E.-C., Mukhopadhyay, S.: Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 385–400. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Wang, Y., Ramamurthy, B., Xue, Y.: A key management protocol for wireless sensor networks with multiple base stations. In: ICC, pp. 1625–1629. IEEE, Los Alamitos (2008)

    Google Scholar 

  14. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: Spins: Security protocols for sensor networks. Wireless Networks, 189–199 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khalid, A., Hussain, M. (2009). A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_72

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02617-1_72

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02616-4

  • Online ISBN: 978-3-642-02617-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics