Abstract
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
AKYILDIZ I F, SU W, SAMKARASUBRAMANIAM Y, CAYIRCI E. Wireless sensor network: A survey [J]. Computer Networks, 2002, 38(4): 393–422.
AZARDERKHSH R, REYHANI-MASOLEH A and ABID Z. A key management scheme for cluster based wireless sensor networks [C]// The IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC’08), Washington DC: IEEE Computer Society, 2008: 222–227.
ESCHENAUER L, GLIGOR V D. A key management scheme for distributed sensor networks [C]// Proc of the 9th ACM Conference on Computer and Communication Security. New York, USA: ACM Press, 2002: 41–47.
ZHANG Jun-qi, VIJAY V. A new security scheme for wireless sensor networks [C]// Global Telecommunication Conference, New Orleans: IEEE “GLOBECOM”, IEEE Press, 2008: 1–5.
MUSFIQ R, SRINIVAS S. A robust pair-wise and group key management protocol for wireless sensor network [C]// IEEE Globecom Workshop on Web and Pervasive Security, Miami: IEEE Press, 2010:1528–1232.
CHOI S J, YOUN H Y. An efficient key pre-distribution scheme for secure distributed sensor networks [C]// Embedded and Ubiquitous Computing (EUC’05 Workshops), Nagasaki: Springer-Verlag, 2005, LNCS 3823: 1088–1097.
WANG Y, RAMAMURTHY B. Group rekeying schemes for secure group communication in wireless sensor network [C]// The IEEE International Conference on Communications, Glasgow: IEEE Press, 2007: 3419–3424.
ZHANG Yuan, SHEN Yong-luo, LEE Sang-ken. A cluster-based group key management scheme for wireless sensor networks [C]// The 12th International Asia-Pacific Web Conference. Busan: IEEE Press, 2010: 386–388.
ZHANG Wen-shen, ZHU Sen-cun, CAO Guo-hong. Predistribution and local collaboration-based group rekeying for wireless sensor network [J]. Ad Hoc Networks, Elsevier, 2009, 7(6):1229–1242.
KHALID A, HUSSAIN M. A secure group rekeying scheme with compromised node revocation in wireless sensor network [C]// ISA 2009, Berlin Heidelberg: Springer-Verlag, 2009, LNCS 5576: 712–721.
GONG Zheng, TANG Qiang, LAW Yee-wei, CHEN Hong-yang. KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks [C]// The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010), LNCS 6584, Shanghai: Springer, 2011: 268–283.
AMIN F, JAHANGIR A H, RASIFARD H. Analysis of public-key cryptography for wireless sensor network security [J]. World Academy of Science, Engineering and Technology 41, 2008: 531–534.
JIANG Jian-wei, LIU Jian-hui. Research on key management scheme for WSN based on elliptic curve cryptosystem [C]// Network digital technologies (NDT’ 09), Ostrava: IEEE Press, 2009: 536–540.
DODIS Y, KATZ J, XU S, YUNG M. Key-insulated public key cryptosystems [C]// Advances in Cryptology-EUROCRYPT’02, London,UK: Springer-Verlag, 2002, LNCS 2332: 65–82.
QIU Wei-dong, ZHOU Yao-wei, ZHU Bo, ZHENG Yan-fei, WEN Mi, GONG Zheng. Key-insulated encryption based key pre-distribution scheme for WSN [C]// ISA 2009, Berlin Heidelberg: Springer-Verlag, 2009, LNCS 5576: 200–210.
BONEH D. The decision Diffie-Hellman problem [C]// Algorithmic Number Theory Symposium, Berlin Heidelberg: Springer-Verlag, 1998, LNCS 1423: 48–63.
JOUX A, Nguyen K. Separating decision Diffie-Hellman from Diffie-Hellman in cryptographic groups [J]. Journal of Cryptology, 2003, 16(4): 239–247.
BELLARE M, PALACIO A. Protecting against key-exposure: Strongly key-insulated encryption with optimal threshold [J]. AAECC, 2006, 16(6): 379–396.
MICHAEL S. Computing the Tate Pairing [C]// Topic in Cryptology-CT-RSA 2005, Berlin Heidelberg: Springer-Verlag, 2005, LNCS 3376: 293–304.
SON J H, LEE J S, SEO S W. Energy efficient group key management scheme for wireless sensor network [C]// The 2nd International Conference on Communication Systems Software and Middleware, Bangalore: IEEE Press, 2007: 1–9.
REN Yi, OLESHCHUK V, LI Frank-Y. An efficient chinese remainder theorem based node capture resilience scheme for mobile WSNs [C]// IEEE International conference on Information Theory and Information Security (ICITIS), Beijing: IEEE Press, 2010: 689–692.
SPENCER J. The strange logic of random graphs, algorithms and combinatorics [M]. Berlin Heidelberg: Springer-Verlag 2001: 68–85.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Project(61100201) supported by National Natural Science Foundation of China; Project(12ZZ019) supported by Technology Innovation Research Program, Shang Municipal Education Commission, China; Project(LYM11053) supported by the Foundation for Distinguished Young Talents in Higher Education of Guangdong Province, China; Project(NCET-12-0358) supported by New Century Excellent Talents in University, Ministry of Education, China
Rights and permissions
About this article
Cite this article
Qiu, Wd., Zhou, Yw., Zhu, B. et al. Key-insulated encryption based group key management for wireless sensor network. J. Cent. South Univ. 20, 1277–1284 (2013). https://doi.org/10.1007/s11771-013-1612-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11771-013-1612-x