An authenticated group key distribution scheme for wireless sensor networks
Tóm tắt
In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processing. In this paper, we present a scalable authenticated scheme for group key distribution based on a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication. The proposed scheme guarantees a lightweight authenticated group key updating procedure and is efficient in terms of storage, communication and computation overheads.
Tài liệu tham khảo
Wander A S, Gura N, Eberle H, et al. Energy analysis of public-key cryptography for wireless sensor networks [C]//Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communication (PerCom 2005). Washington, DC, USA: IEEE Computer Society, 2005: 324–328.
Gaubatz G, Kaps J, Sunar B. Public keys cryptography in sensor networks — revisited [C]//Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS’04). Berlin/Heidelberg: Springer, 2005: 2–18.
Eltoweissy M, Heydari H, Morales L, et al. Combinatorial optimization of group key management [J]. Journal of Network and System Management, 2004, 12(1): 33–50.
Eltoweissy M, Younis M, Ghumman K. Lightweight key management for wireless sensor networks [C]//Proceeding of 2004 IEEE International Conference on Performance, Computing, and Communications. NJ: IEEE, 2004: 813–818.
Moharrum M, Mukkamala R, Eltoweissy M. CKDS: An efficient combinatorial key distribution scheme for wireless ad-hoc networks [C]//Proceeding of 2004 IEEE International Conference on Performance, Computing, and Communications. NJ: IEEE, 2004: 631–636.
Moharrum M, Eltoweissy M, Mukkamala R. Dynamic combinatorial key management scheme for sensor networks [J]. Wireless Communications and Mobile Computing, 2006, 6(7): 1017–1035.
Wong C K, Gouda M G, Lam S S. Secure group communications using key graphs [J]. IEEE/ACM Transactions on Networking, 2000, 8(1): 16–30.
Zhu S, Setia S, Xu S, et al. GKMPAN: An efficient group rekeying scheme for secure multicast in adhoc networks [J]. Journal of Computer Security, 2006, 14(4): 301–325.
Younis M, Ghumman K, Eltoweissy M. Key management in wireless ad hoc networks: Collusion analysis and prevention [C]// Proceedings of 24th IEEE International Performance, Computing and Communications Conference. NJ: IEEE, 2005: 199–203.