Key-insulated encryption based group key management for wireless sensor network

Wei-dong Qiu , Yao-wei Zhou , Bo Zhu , Yan-fei Zheng , Zheng Gong

Journal of Central South University ›› 2013, Vol. 20 ›› Issue (5) : 1277 -1284.

PDF
Journal of Central South University ›› 2013, Vol. 20 ›› Issue (5) : 1277 -1284. DOI: 10.1007/s11771-013-1612-x
Article

Key-insulated encryption based group key management for wireless sensor network

Author information +
History +
PDF

Abstract

The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.

Keywords

wireless sensor network / data encryption / group key management / forward security / key-insulated encryption

Cite this article

Download citation ▾
Wei-dong Qiu, Yao-wei Zhou, Bo Zhu, Yan-fei Zheng, Zheng Gong. Key-insulated encryption based group key management for wireless sensor network. Journal of Central South University, 2013, 20(5): 1277-1284 DOI:10.1007/s11771-013-1612-x

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

AkyildizI F, SuW, SamkarasubramaniamY, CayirciE. Wireless sensor network: A survey [J]. Computer Networks, 2002, 38(4): 393-422

[2]

AzarderkhshR, Reyhani-MasolehA, AbidZ. A key management scheme for cluster based wireless sensor networks [C]. The IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC’08), 2008Washington DCIEEE Computer Society222-227

[3]

EschenauerL, GligorV D. A key management scheme for distributed sensor networks [C]. Proc of the 9th ACM Conference on Computer and Communication Security, 2002New York, USAACM Press41-47

[4]

ZhangJ-q, VijayV. A new security scheme for wireless sensor networks [C]. Global Telecommunication Conference, 2008New OrleansIEEE “GLOBECOM”, IEEE Press1-5

[5]

MusfiqR, SrinivasS. A robust pair-wise and group key management protocol for wireless sensor network [C]. IEEE Globecom Workshop on Web and Pervasive Security, 2010MiamiIEEE Press1528-1232

[6]

ChoiS J, YounH Y. An efficient key pre-distribution scheme for secure distributed sensor networks [C]. Embedded and Ubiquitous Computing (EUC’05 Workshops), 2005NagasakiSpringer-Verlag1088-1097

[7]

WangY, RamamurthyB. Group rekeying schemes for secure group communication in wireless sensor network [C]. The IEEE International Conference on Communications, 2007GlasgowIEEE Press3419-3424

[8]

ZhangY, ShenY-l, LeeS-ken. A cluster-based group key management scheme for wireless sensor networks [C]. The 12th International Asia-Pacific Web Conference, 2010BusanIEEE Press386-388

[9]

ZhangW-s, ZhuS-c, CaoG-hong. Predistribution and local collaboration-based group rekeying for wireless sensor network [J]. Ad Hoc Networks, Elsevier, 2009, 7(6): 1229-1242

[10]

KhalidA, HussainM. A secure group rekeying scheme with compromised node revocation in wireless sensor network [C]. ISA 2009, 2009Berlin HeidelbergSpringer-Verlag712-721

[11]

GongZ, TangQ, LawY-w, ChenH-yang. KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks [C]. The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010), 2011ShanghaiSpringer268-283

[12]

AminF, JahangirA H, RasifardH. Analysis of public-key cryptography for wireless sensor network security [J]. World Academy of Science, Engineering and Technology 41, 2008531-534

[13]

JiangJ-w, LiuJ-hui. Research on key management scheme for WSN based on elliptic curve cryptosystem [C]. Network digital technologies (NDT’ 09), 2009OstravaIEEE Press536-540

[14]

DodisY, KatzJ, XuS, YungM. Key-insulated public key cryptosystems [C]. Advances in Cryptology-EUROCRYPT’02, 2002London,UKSpringer-Verlag65-82

[15]

QiuW-d, ZhouY-w, ZhuB, ZhengY-f, WenM, GongZheng. Key-insulated encryption based key pre-distribution scheme for WSN [C]. ISA 2009, 2009Berlin HeidelbergSpringer-Verlag200-210

[16]

BonehD. The decision Diffie-Hellman problem [C]. Algorithmic Number Theory Symposium, 1998Berlin HeidelbergSpringer-Verlag48-63

[17]

JouxA, NguyenK. Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups [J]. Journal of Cryptology, 2003, 16(4): 239-247

[18]

BellareM, PalacioA. Protecting against key-exposure: Strongly key-insulated encryption with optimal threshold [J]. AAECC, 2006, 16(6): 379-396

[19]

MichaelS. Computing the Tate Pairing [C]. Topic in Cryptology-CT-RSA 2005, 2005Berlin HeidelbergSpringer-Verlag293-304

[20]

SonJ H, LeeJ S, SeoS W. Energy efficient group key management scheme for wireless sensor network [C]. The 2nd International Conference on Communication Systems Software and Middleware, 2007BangaloreIEEE Press1-9

[21]

RenY, OleshchukV, LiF-Y. An efficient chinese remainder theorem based node capture resilience scheme for mobile WSNs [C]. IEEE International conference on Information Theory and Information Security (ICITIS), 2010BeijingIEEE Press689-692

[22]

SpencerJThe strange logic of random graphs, algorithms and combinatorics [M], 2001Berlin HeidelbergSpringer-Verlag68-85

AI Summary AI Mindmap
PDF

212

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/