2007
DOI: 10.1007/978-3-540-72738-5_25
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains

Abstract: Abstract. Security of group communication for large mobile wireless sensor network hinges on efficient key distribution and key management mechanism. As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed in the key distribution schemes. Therefore, self-healing is a good property for key distribution in wireless applications. The main idea of self-healing key distribution scheme is that even if during a certain session some broadcast messages are lost due to netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
51
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 46 publications
(51 citation statements)
references
References 29 publications
0
51
0
Order By: Relevance
“…Definition 3 (t-wise backward secrecy [11]). Let J j ⊆ U denote a set of users who join the group after session j, where |J j | ≤ t. A key-distribution scheme guarantees backward secrecy if the members in J j together cannot get any information about K j , even with the knowledge of group session keys after session j.…”
Section: Gm Is the Group Manager (Base Station)mentioning
confidence: 99%
See 2 more Smart Citations
“…Definition 3 (t-wise backward secrecy [11]). Let J j ⊆ U denote a set of users who join the group after session j, where |J j | ≤ t. A key-distribution scheme guarantees backward secrecy if the members in J j together cannot get any information about K j , even with the knowledge of group session keys after session j.…”
Section: Gm Is the Group Manager (Base Station)mentioning
confidence: 99%
“…An adversary could recover the group's session key with just broadcast messages. In [11], Dutta et al proposed two self-healing, key-distribution schemes with revocation that were secure, but they did not consider collusion attacks. In [12], Dutta et al proposed a new self-healing key-distribution scheme with a constant storage overhead by using only one secret polynomial.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Since we suppose the added/removed nodes might be tampered, the resilience of compromise becomes serious in WMSN key management. Secondly, a typical WMSN is a moderate-scale WSN, so probabilistic key sharing schemes that are designed for large-scale WSNs are not suitable [6,7,12]. For practical applications, a good WMSN key management scheme must consider the above differences carefully, whilst balancing the applicability and the security.…”
Section: Introductionmentioning
confidence: 99%
“…Further improvements in efficiency are obtained by relaxing the security slightly -from unconditional to computational [8], [5], [10]. The schemes [12], [13], [17] are based on vector space access structure instead of Shamir's [14] secret sharing.…”
Section: Introductionmentioning
confidence: 99%