Advertisement

Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks

  • Firdous Kausar
  • Sajid Hussain
  • Jong Hyuk Park
  • Ashraf Masood
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4864)

Abstract

We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distributing rekeying messages and specify techniques for joining and leaving a group. Access control in multicast system is usually achieved by encrypting the content using an encryption key, known as the group key (session key) that is only known by the group controller and all legitimate group members. In our scheme, all rekeying messages, except for unicast of an individual key, are transmitted without any encryption using one-way hash function and XOR operation. In our proposed scheme, nodes are capable of recovering lost session keys on their own, without requesting additional transmission from the group controller. The proposed scheme provides both backward and forward secrecy. We analyze the proposed scheme to verify that it satisfies the security and performance requirements for secure group communication.

Keywords

sensor networks security key distribution secure group communication one-way hash chains 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures (1999)Google Scholar
  2. 2.
    Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: INFOCOMM 1999 (1999)Google Scholar
  3. 3.
    Kurnio, H., Safavi-Naini, R., Wang, H.: A secure re-keying scheme with key recovery property. In: Proceedings of the 7th Australian Conference on Information Security and Privacy, pp. 40–55. Springer, London, UK (2002)Google Scholar
  4. 4.
    Wang, L., Wu, C.K.: Authenticated group key agreement for multicast. In: The 5th International Conference on Cryptology and Network Security, Springer, Heidelberg (2006)Google Scholar
  5. 5.
    Ki, J.H., Kim, H.J., Lee, D.H., Park, C.S.: Efficient multicast key management for stateless receivers. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 497–509. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Pegueroles, J., Bin, W., Soriano, M., Rico-Novella1, F.: Group rekeying algorithm using pseudo-random functions and modular reduction. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003. LNCS, vol. 3032, pp. 875–882. Springer, Heidelberg (2004)Google Scholar
  7. 7.
    Yang, Y.R., Li, X.S., Zhang, X.B., Lam, S.S.: Reliable group rekeying: a performance analysis. In: SIGCOMM 2001. Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 27–38. ACM Press, New York, NY, USA (2001)CrossRefGoogle Scholar
  8. 8.
    Poovendran, R., Baras, J.S.: An information theoretic analysis of rooted-tree based secure multicast key distribution schemes. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 624–638. Springer, Heidelberg (1999)Google Scholar
  9. 9.
    Noubir, G., Zhu, F., Chan, A.H.: Key management for simultaneous join/leave in secure multicast. In: Proceedings of MILCOM (2003)Google Scholar
  10. 10.
    Gong, L., Shacham, N.: Multicast security and its extension to a mobile environment. Wirel. Netw. 1(3), 281–295 (1995)CrossRefGoogle Scholar
  11. 11.
    Bruschi, D., Rosti, E.: Secure multicast in wireless networks of mobile hosts: protocols and issues. Mob. Netw. Appl. 7(6), 503–511 (2002)CrossRefGoogle Scholar
  12. 12.
    Kostas, T., Kiwior, D., Rajappan, G., Dalal, M.: Key management for secure multicast group communication in mobile networks. In: Proceedings of DARPA Information Survivability Conference and Exposition (2003)Google Scholar
  13. 13.
    Park, T., Shin, K.G.: Lisp: A lightweight security protocol for wireless sensor networks. Trans. on Embedded Computing Sys. 3(3), 634–660 (2004)CrossRefGoogle Scholar
  14. 14.
    Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Trans. Netw. 8(1), 16–30 (2000)CrossRefGoogle Scholar
  15. 15.
    Carman, D., Matt, B., Cirincione, G.: Energy-efficient and low-latency key management for msn networks. In: Proceedings of 23rd Army Science Conference, Orlando FL (2002)Google Scholar
  16. 16.
    Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing key distribution with revocation. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 241–257 (2002)Google Scholar
  17. 17.
    Liu, D., Ning, P., Sun, K.: Efficient self-healing group key distribution with revocation capability. In: CCS 2003. Proceedings of the 10th ACM conference on Computer and communications security, pp. 231–240. ACM Press, New York, NY, USA (2003)CrossRefGoogle Scholar
  18. 18.
    Blundo, C., Darco, P., Santis, A.D., Listo, M.: Design of self-healing key distribution schemes. Des. Codes Cryptography 32(1-3), 15–44 (2004)zbMATHCrossRefGoogle Scholar
  19. 19.
    Jiang, Y., Lin, C., Shi, M., Shen, X.: Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Networks 5(1), 14–23 (2007)CrossRefGoogle Scholar
  20. 20.
    Dutta, R., Chang, E.C., Mukhopadhyay, S.: Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains. In: ACNS 2007. Proceedings of 5 th International Conference on Applied Cryptography and Network Security (2007)Google Scholar
  21. 21.
    NIST: Secure hash standard. In: National Institute for Standards and Technology, Gaithersburg, MD, USA (April 1995)Google Scholar
  22. 22.
    Gay, D., Levis, P., von Behren, R., Welsh, M., Brewer, E., Culler, D.: The nesc language: A holistic approach to networked embedded systems. SIGPLAN Not. 38(5), 1–11 (2003)CrossRefGoogle Scholar
  23. 23.

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Firdous Kausar
    • 1
  • Sajid Hussain
    • 2
  • Jong Hyuk Park
    • 3
  • Ashraf Masood
    • 1
  1. 1.College of Signals, National University of Science and Technology (NUST), RawalpindiPakistan
  2. 2.Jodrey School of Computer Science, Acadia University, Nova ScotiaCanada
  3. 3.Department of Computer Engineering, Kyungnam University, MasanKorea

Personalised recommendations