Abstract
Recently, Wang et al. (J Secur Commun Netw 5(12):1363–1374, 2012) proposed a self-healing group key distribution (SGKD) scheme for resource-constrained wireless networks. They claimed that their proposed SGKD scheme satisfies forward security, backward security and can resist collusion attack. Unfortunately, we found some security flaws in their scheme. In this paper, we present a method to attack this scheme. The attack illustrates that this scheme does not satisfy forward security, which also directly breaks the collusion resistance capability. We also propose an improved scheme with constant storage overhead and satisfactory security.
Similar content being viewed by others
References
Staddon, J., et al. (2002) Self-healing key distribution with revocation. In Proceedings of the 2002 IEEE symposium on security and privacy (pp 241–257).
Rams, T., & Pacyna, P. (2013). A survey of group key distribution schemes with self-healing property. IEEE on Communications Surveys and Tutorials, 15(2), 820–842.
Blundo, C., D’Arco, P., Listo, M. (2003). A flaw in a self-healing key distribution scheme. In Proceedings on the 2003 IEEE information theory workshop (pp 163–166).
Blundo, Carlo, et al. (2004). Design of self-healing key distributionschemes. Designs Codes and Cryptography, 32.13, 15–44.
Blundo, C., D’Arco, P., & De Santis, A. (2006). On self-healing key distribution schemes. IEEE Transactions on Information Theory, 52(12), 5455–5467.
More, S., et al. (2003) Sliding-window self-healing key distribution. In Proceedings of ACM workshop on survivable and self-regenerative systems, 2003
Liu, D., Ning, P., Sun, K. (2003). Efficient self-healing group key distribution with revocation Capability. In Proceedings of the 10th ACM conference on computer and communications security CCS 03 (pp. 231–240).
Hong, D., & Kang, J. (2005). An efficient key distribution scheme with self-healing property. IEEE Communications Letters, 9(8), 759–761.
Dutta, R., Chang, E., Mukhopadhyay, S. (June 2007) Constant storage self-healing key distribution with revocation in wireless sensor network. In Proceedings of IEEE International Conference on Communications (ICC 2007) (pp.1323–1332). Glasgow, Scotland. 24–28 June 2007.
Dutta, R., & Mukhopadhyay, S. (2007). Designing scalable self-healing key distribution schemes with revocation capability. Parallel and Distributed Processing and Application, LNCS, 4742, 419–430.
Dutta, R., Change, E. C., & Mukhopadhyay, S. (2007). Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains, ACNS 2007. Lecture Notes in Computer Science, 4521, 385–400.
Song, H., Tian, B., & He, M. (2009). Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks. IEEE Transactions on Wireless Communications, 8(4), 1876–1887.
Chen, H., & Xie, L. (2014). Improved one-way hash chain and revocation polynomial-based self-healing group key distribution schemes in resource-constrained wireless networks. Sensors, 14(12), 24358–24380.
Guo, H., Zheng, Y., Wang, B., & Li, Z. (2015). A note on an improved self-healing group key distribution scheme. Sensors, 10, 25033–25038.
Zou, X., & Dai, Y.S. (2006) A robust and stateless self-healing group key management scheme. In International conference on communication technology (pp. 1–4).
Tian, B., Han, S., & Dillon, T. S. (2008). An efficient self-healingKey distribution scheme. In IEEE of new technologies, mobility and security, 2008, NTMS ’08 (pp. 1–5).
Dutta, R. (2011) Access polynomial based self-healing key distribution with improved security and performance. In International conference on security aspects in information technology (pp. 72–82).
Piao, Y., Kim, J. U., & Tariq, U., et al. (2013). Polynomial-based key management for secure intra-group and inter-group communication. Computers and Mathematics with Applications, 65(9), 1300–1309.
Bao, K., & Zhang, Z. (2010). Collusion attack on a self-healing key distribution with revocation in wireless sensor networks. Information Security Applications, 6513, 221–233.
Wang, Q., et al. (2012). Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks. Security and Communication Networks, 5(12), 1363–1374.
Zheng, Y., Guo H. On the security of a self-healing group key distribution scheme[db/ol]. http://eprint.iacr.org/2015/697.
Sun, X., Wu, X., Huang, C., et al. (2015). Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks. Ad Hoc Networks, 37(P2), 324–336.
Acknowledgments
This work was supported by the National Natural Science Foundation of China (No. 61300172,61572027), the Research Fund for the Doctoral Program of Higher Education (No. 20121102120017), the Fund of the State Key Laboratory of Software Development Environment (No.SKLSDE-2016ZX-17).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Guo, H., Zheng, Y. On the Security of a Self-Healing Group Key Distribution Scheme. Wireless Pers Commun 91, 1109–1121 (2016). https://doi.org/10.1007/s11277-016-3515-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3515-2