Skip to main content
Erschienen in: Wireless Personal Communications 3/2016

13.08.2016

On the Security of a Self-Healing Group Key Distribution Scheme

verfasst von: Hua Guo, Yandong Zheng

Erschienen in: Wireless Personal Communications | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, Wang et al. (J Secur Commun Netw 5(12):1363–1374, 2012) proposed a self-healing group key distribution (SGKD) scheme for resource-constrained wireless networks. They claimed that their proposed SGKD scheme satisfies forward security, backward security and can resist collusion attack. Unfortunately, we found some security flaws in their scheme. In this paper, we present a method to attack this scheme. The attack illustrates that this scheme does not satisfy forward security, which also directly breaks the collusion resistance capability. We also propose an improved scheme with constant storage overhead and satisfactory security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Staddon, J., et al. (2002) Self-healing key distribution with revocation. In Proceedings of the 2002 IEEE symposium on security and privacy (pp 241–257). Staddon, J., et al. (2002) Self-healing key distribution with revocation. In Proceedings of the 2002 IEEE symposium on security and privacy (pp 241–257).
2.
Zurück zum Zitat Rams, T., & Pacyna, P. (2013). A survey of group key distribution schemes with self-healing property. IEEE on Communications Surveys and Tutorials, 15(2), 820–842.CrossRef Rams, T., & Pacyna, P. (2013). A survey of group key distribution schemes with self-healing property. IEEE on Communications Surveys and Tutorials, 15(2), 820–842.CrossRef
3.
Zurück zum Zitat Blundo, C., D’Arco, P., Listo, M. (2003). A flaw in a self-healing key distribution scheme. In Proceedings on the 2003 IEEE information theory workshop (pp 163–166). Blundo, C., D’Arco, P., Listo, M. (2003). A flaw in a self-healing key distribution scheme. In Proceedings on the 2003 IEEE information theory workshop (pp 163–166).
4.
Zurück zum Zitat Blundo, Carlo, et al. (2004). Design of self-healing key distributionschemes. Designs Codes and Cryptography, 32.13, 15–44.MathSciNetCrossRefMATH Blundo, Carlo, et al. (2004). Design of self-healing key distributionschemes. Designs Codes and Cryptography, 32.13, 15–44.MathSciNetCrossRefMATH
5.
Zurück zum Zitat Blundo, C., D’Arco, P., & De Santis, A. (2006). On self-healing key distribution schemes. IEEE Transactions on Information Theory, 52(12), 5455–5467.MathSciNetCrossRefMATH Blundo, C., D’Arco, P., & De Santis, A. (2006). On self-healing key distribution schemes. IEEE Transactions on Information Theory, 52(12), 5455–5467.MathSciNetCrossRefMATH
6.
Zurück zum Zitat More, S., et al. (2003) Sliding-window self-healing key distribution. In Proceedings of ACM workshop on survivable and self-regenerative systems, 2003 More, S., et al. (2003) Sliding-window self-healing key distribution. In Proceedings of ACM workshop on survivable and self-regenerative systems, 2003
7.
Zurück zum Zitat Liu, D., Ning, P., Sun, K. (2003). Efficient self-healing group key distribution with revocation Capability. In Proceedings of the 10th ACM conference on computer and communications security CCS 03 (pp. 231–240). Liu, D., Ning, P., Sun, K. (2003). Efficient self-healing group key distribution with revocation Capability. In Proceedings of the 10th ACM conference on computer and communications security CCS 03 (pp. 231–240).
8.
Zurück zum Zitat Hong, D., & Kang, J. (2005). An efficient key distribution scheme with self-healing property. IEEE Communications Letters, 9(8), 759–761.CrossRef Hong, D., & Kang, J. (2005). An efficient key distribution scheme with self-healing property. IEEE Communications Letters, 9(8), 759–761.CrossRef
9.
Zurück zum Zitat Dutta, R., Chang, E., Mukhopadhyay, S. (June 2007) Constant storage self-healing key distribution with revocation in wireless sensor network. In Proceedings of IEEE International Conference on Communications (ICC 2007) (pp.1323–1332). Glasgow, Scotland. 24–28 June 2007. Dutta, R., Chang, E., Mukhopadhyay, S. (June 2007) Constant storage self-healing key distribution with revocation in wireless sensor network. In Proceedings of IEEE International Conference on Communications (ICC 2007) (pp.1323–1332). Glasgow, Scotland. 24–28 June 2007.
10.
Zurück zum Zitat Dutta, R., & Mukhopadhyay, S. (2007). Designing scalable self-healing key distribution schemes with revocation capability. Parallel and Distributed Processing and Application, LNCS, 4742, 419–430.CrossRef Dutta, R., & Mukhopadhyay, S. (2007). Designing scalable self-healing key distribution schemes with revocation capability. Parallel and Distributed Processing and Application, LNCS, 4742, 419–430.CrossRef
11.
Zurück zum Zitat Dutta, R., Change, E. C., & Mukhopadhyay, S. (2007). Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains, ACNS 2007. Lecture Notes in Computer Science, 4521, 385–400. Dutta, R., Change, E. C., & Mukhopadhyay, S. (2007). Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains, ACNS 2007. Lecture Notes in Computer Science, 4521, 385–400.
12.
Zurück zum Zitat Song, H., Tian, B., & He, M. (2009). Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks. IEEE Transactions on Wireless Communications, 8(4), 1876–1887.CrossRef Song, H., Tian, B., & He, M. (2009). Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks. IEEE Transactions on Wireless Communications, 8(4), 1876–1887.CrossRef
13.
Zurück zum Zitat Chen, H., & Xie, L. (2014). Improved one-way hash chain and revocation polynomial-based self-healing group key distribution schemes in resource-constrained wireless networks. Sensors, 14(12), 24358–24380.CrossRef Chen, H., & Xie, L. (2014). Improved one-way hash chain and revocation polynomial-based self-healing group key distribution schemes in resource-constrained wireless networks. Sensors, 14(12), 24358–24380.CrossRef
14.
Zurück zum Zitat Guo, H., Zheng, Y., Wang, B., & Li, Z. (2015). A note on an improved self-healing group key distribution scheme. Sensors, 10, 25033–25038.CrossRef Guo, H., Zheng, Y., Wang, B., & Li, Z. (2015). A note on an improved self-healing group key distribution scheme. Sensors, 10, 25033–25038.CrossRef
15.
Zurück zum Zitat Zou, X., & Dai, Y.S. (2006) A robust and stateless self-healing group key management scheme. In International conference on communication technology (pp. 1–4). Zou, X., & Dai, Y.S. (2006) A robust and stateless self-healing group key management scheme. In International conference on communication technology (pp. 1–4).
16.
Zurück zum Zitat Tian, B., Han, S., & Dillon, T. S. (2008). An efficient self-healingKey distribution scheme. In IEEE of new technologies, mobility and security, 2008, NTMS ’08 (pp. 1–5). Tian, B., Han, S., & Dillon, T. S. (2008). An efficient self-healingKey distribution scheme. In IEEE of new technologies, mobility and security, 2008, NTMS ’08 (pp. 1–5).
17.
Zurück zum Zitat Dutta, R. (2011) Access polynomial based self-healing key distribution with improved security and performance. In International conference on security aspects in information technology (pp. 72–82). Dutta, R. (2011) Access polynomial based self-healing key distribution with improved security and performance. In International conference on security aspects in information technology (pp. 72–82).
18.
Zurück zum Zitat Piao, Y., Kim, J. U., & Tariq, U., et al. (2013). Polynomial-based key management for secure intra-group and inter-group communication. Computers and Mathematics with Applications, 65(9), 1300–1309.MathSciNetCrossRef Piao, Y., Kim, J. U., & Tariq, U., et al. (2013). Polynomial-based key management for secure intra-group and inter-group communication. Computers and Mathematics with Applications, 65(9), 1300–1309.MathSciNetCrossRef
19.
Zurück zum Zitat Bao, K., & Zhang, Z. (2010). Collusion attack on a self-healing key distribution with revocation in wireless sensor networks. Information Security Applications, 6513, 221–233.CrossRef Bao, K., & Zhang, Z. (2010). Collusion attack on a self-healing key distribution with revocation in wireless sensor networks. Information Security Applications, 6513, 221–233.CrossRef
20.
Zurück zum Zitat Wang, Q., et al. (2012). Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks. Security and Communication Networks, 5(12), 1363–1374.CrossRef Wang, Q., et al. (2012). Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks. Security and Communication Networks, 5(12), 1363–1374.CrossRef
22.
Zurück zum Zitat Sun, X., Wu, X., Huang, C., et al. (2015). Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks. Ad Hoc Networks, 37(P2), 324–336. Sun, X., Wu, X., Huang, C., et al. (2015). Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks. Ad Hoc Networks, 37(P2), 324–336.
Metadaten
Titel
On the Security of a Self-Healing Group Key Distribution Scheme
verfasst von
Hua Guo
Yandong Zheng
Publikationsdatum
13.08.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3515-2

Weitere Artikel der Ausgabe 3/2016

Wireless Personal Communications 3/2016 Zur Ausgabe

Neuer Inhalt