Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks
نویسندگان
چکیده
Though lots of research results about self-healing key management under unreliable links have been proposed, there are still some shortcomings, such as the inefficiency of broadcasts, lack of broadcast authentication, limited sessions for key issues, disastrous risks of access polynomials, and the vulnerability of collusion attacks. In this paper, we propose two modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance. First, two kinds of attacks are introduced to break the security of access polynomials. Then, a modified security model is given, and collusion resistance capability is redefined from the perspective of session interval from node revocation to node addition, which does not depend on the number of collusive nodes. Next, based on sliding window and modified access polynomial, Sch-I and Sch-II are proposed to achieve the security and tolerate packet losses, which allow pairwise keys between member nodes and group manager to be updated dynamically. Finally, theoretical analysis validates that the proposed schemes have δ self-healing capability, any-wise forward security and backward security, and enhanced collusion resistance capability, and can also avoid the flaws of access polynomials and reduce the resource consumption. Compared with existing schemes, they are quite suitable for practical applications. © 2015 Elsevier B.V. All rights reserved.
منابع مشابه
Toward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملSelf-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks
In wireless sensor networks, self-healing key-distribution schemes are used to ensure that, even if the message packets that are broadcast in some sessions get lost, the group nodes can still recover the lost session keys simply by using their personal secret keys and broadcast messages that have been received without requesting additional transmissions from the group manager. These schemes red...
متن کاملHypercube Bivariate-Based Key Management for Wireless Sensor Networks
Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Ad Hoc Networks
دوره 37 شماره
صفحات -
تاریخ انتشار 2016