Skip to main content

A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks

  • Conference paper
Book cover Algorithms and Architectures for Parallel Processing (ICA3PP 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5574))

Abstract

A self-healing key distribution scheme enables the non-revoked users with the received broadcast messages and their private information to recover the missed group session keys on their own without requiring the group manager to retransmit the missed broadcast messages. In this paper, we construct a new structure to broadcast message to realize the self-healing key distribution. It is shown that the proposed scheme realizes the properties such as constant storage, forward secrecy and backward secrecy. Moreover, the proposed scheme has the property of long life-span of the user’s personal secret key, so that the user’s personal secret key is not restricted to a fixed sessions in the setup phase and can be used until the user revoked from the group. Finally, we will present that the proposed scheme is more practical and efficient than some existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Camtepe, S., Yener, B.: Key Distribution Mechanisms for Wireless Sensor Networks: A Survey. Technical Report, TR-05-07, Rensselaer Polytechnic Institute (2005)

    Google Scholar 

  2. Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing Key Distribution with Revocation. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 241–257 (2002)

    Google Scholar 

  3. Liu, D., Ning, P., Sun, K.: Efficient Self-healing Group Key Distribution with Revocation Capability. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 231–240. ACM Press, New York (2003)

    Chapter  Google Scholar 

  4. More, S., Malkin, M., Staddon, J.: Sliding-window Self-healing Key Distribution with Revocation. In: ACM Workshop on Survivable and Self-regenerative Systems (2003)

    Google Scholar 

  5. Blundo, C., D’Arco, P., Santis, A.D., Listo, M.: Design of self-healing key distribution schemes. Des. Codes Cryptography 32(1-3), 15–44 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  6. Blundo, C.: Randomness in Self-Healing Key Distribution Schemes. In: Theory and Practice in Information-Theoretic Security, 2005. IEEE Information Theory Workshop, pp. 80–84 (2005)

    Google Scholar 

  7. Blundo, C., D’Arco, P., Listo, M.: A Flaw in a Self-Healing Key Distribution Scheme. In: Proceedings of Information Theory Workshop, Paris, pp. 163–166 (2003)

    Google Scholar 

  8. Blundo, C., D’Arco, P., Santis, A., Listo, M.: Definitions and Bounds for Self- healing Key Distribution. In: Díaz, J., Karhumäki, J., Lepistö, A., Sannella, D. (eds.) ICALP 2004. LNCS, vol. 3142, pp. 234–245. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Hong, D., Kang, J.: An Efficient Key Distribution Scheme with Selfhealing Property. IEEE Communication Letters 9, 759–761 (2005)

    Article  Google Scholar 

  10. Dutta, R., Wu, Y., Mukhopadhyay, S.: Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network. In: IEEE International Conference on Communications 2007, pp. 1323–1328(2007)

    Google Scholar 

  11. Shamir, A.: How to Share a Secret. Communications of ACM 22, 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  12. Zou, X., YuanShun, D.: A Robust and Stateless Self-Healing Group Key Management Scheme. In: International Conference on Communication Technology, pp. 1–4 (2006)

    Google Scholar 

  13. Dutta, R., Chang, E., Mukhopadhyay, S.: Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using one way hash chains. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 385–400. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  14. Chadha, A., Yonghe, L., Das, S.K.: Group Key Distribution via Local Collaboration in Wireless Sensor Networks. In: Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, pp. 46–54 (2005)

    Google Scholar 

  15. Tian, B., He, M.: A Self-healing Key Distribution Scheme with Novel Properties. International Journal of Network Security 7(1), 115–120 (2008)

    MathSciNet  Google Scholar 

  16. Du, W., He, M.: Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 345–359. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Du, W., He, M., Li, X. (2009). A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks. In: Hua, A., Chang, SL. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2009. Lecture Notes in Computer Science, vol 5574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03095-6_78

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03095-6_78

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03094-9

  • Online ISBN: 978-3-642-03095-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics