期刊文献+

A Loss-Tolerant Group Key Management Scheme with Revocation Capability for Wireless Sensor Network

A Loss-Tolerant Group Key Management Scheme with Revocation Capability for Wireless Sensor Network
原文传递
导出
摘要 A new group key management scheme against the unreliable wireless communication channel and unsafe environment was proposed for wireless sensor network(WSN).In the proposed scheme,broadcast polynomial, generated over finite field F_q based on the secret sharing,was employed to revoke compromised sensor nodes.In order to tolerate key-update message loss,group session keys were generated as one-way hash chain sequence and distributed in advance.The analysis showes that the scheme has better performance in terms of the computation and communication overhead. A new group key management scheme against the unreliable wireless communication channel and unsafe environment was proposed for wireless sensor network (WSN). In the proposed scheme, broadcast polynomial, generated over finite field Fq based on the secret sharing, was employed to revoke compromised sensor nodes. In order to tolerate key-update message loss, group session keys were generated as one-way hash chain sequence and distributed in advance. The analysis showes that the scheme has better performance in terms of the computation and communication overhead.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第2期162-167,共6页 上海交通大学学报(英文版)
基金 the National High Technology Researchand Development Program(863)of China(Nos.2006AA01Z436,2007AA01Z452,2007AA01Z473)
关键词 management one-way hash chain broadcast polynomial node revocation loss-tolerant 无线传感器网络 组密钥管理 撤销 能力 容错 传感器节点 通信信道 秘密共享
  • 相关文献

参考文献11

  • 1Carlo Blundo,Paolo D’Arco,Alfredo De Santis,Massimiliano Listo.Design of Self-Healing Key Distribution Schemes[J].Designs Codes and Cryptography (-).2004(1-3)
  • 2Adrian Perrig,Robert Szewczyk,J.D. Tygar,Victor Wen,David E. Culler.SPINS: Security Protocols for Sensor Networks[J].Wireless Networks.2002(5)
  • 3STADDON J,,MINER S,FRANKLIN M,et al.Self-healing key distribution with revocation[].Proceedings of IEEE Symposium on Security and Privacy.2002
  • 4LI J,JANNOTTI J,COUTO D S J D,et al.A scalable location service for geographic ad hoc routing[].Proceedings of the th Annual International Conference on Mobile Computing and Networking.2000
  • 5Shamir A.How to share a secret[].Communications of the ACM.1979
  • 6Naor M,Pinkas B.Efficient trace and revoke schemes[].Financial cryptography.2000
  • 7LIU Dong-gang,NING Peng,SUN Kun.Efficient self-healing groupkey distribution with revocation capability[].Proc of the th Con-fe-rence on Computer and Communications Security ACM Conferenceon Computer and Communictions Security.2003
  • 8HONG D,KANG J S.An efficient key distribution scheme with self-healing property[].IEEE Communications Letters.2005
  • 9PARK T J,Arbor A,Shim I B.LiSP: A Light-weight Security Protocol for Wireless Sensor Networks[].ACM Transactions on Embedded Computing Systems.2004
  • 10JIANG Y X,LIN C,SHI MH,et al.Self-healing group key dis-tribution with time-limited node revocation for wireless sensor net-works[].Ad Hoc Networks.2007

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部