Advertisement

A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks

  • Guangli Xiang
  • Lu Yu
  • Beilei Li
  • Mengsen Xia
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10631)

Abstract

Group communication in mobile Ad Hoc network (MANET), because of its special characteristics of large-scale mobile nodes, frequent change and update of group members relationship, open and unstable communication channel and high rate of packets loss, making secure group communication in MANET face many security threats, so how to realize secure communication between mobile nodes and how to establish secure session keys shared between mobile nodes has been the focus of MANET. Aimed at the problem mentioned above, a group key distribution scheme based on three hash chains is proposed for MANET. This scheme introduces a self-healing hash chain based on Dual Directional Hash Chain(DDHC), when a node is revoked, the corresponding self-healing hash value will be replaced by a new random value, so that revoked nodes can not realize collusion attack with the newly added node; This scheme also takes into account the high rate of packet loss in MANET, and realizes self-healing property. The security and performance analysis shows that the scheme can meet the security requirements of group communication for MANET, and it has the characteristics of dynamic revocation and resists collusion. The scheme also reduces the storage overhead and the communication load to a large extent, and can meet the performance requirements of group communication for MANET.

Keywords

Mobile ad hoc network Group key distribution Dual directional hash chain Self-healing Resist collusion 

References

  1. 1.
    Chen, H., Xie, L.: Improved one-way hash chain and revocation polynomial-based self-healing group key distribution schemes in resource-constrained wireless networks. Sensors 14(12), 24358–24380 (2014)CrossRefGoogle Scholar
  2. 2.
    Du, C., Hu, M., Zhang, H., Zhang, W.: Anti-collusive self-healing key distribution scheme with revocation capability. Inf. Technol. J. 8(4), 619–624 (2009)CrossRefGoogle Scholar
  3. 3.
    Du, W., He, M.: Self-healing key distribution with revocation and resistance to the collusion attack in wireless sensor networks. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 345–359. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-88733-1_25CrossRefGoogle Scholar
  4. 4.
    Dutta, R., Mukhopadhyay, S.: Improved self-healing key distribution with revocation in wireless sensor network. In: Wireless Communications and NETWORKING Conference, pp. 2963–2968. IEEE (2007)Google Scholar
  5. 5.
    Dutta, R., Mukhopadhyay, S., Collier, M.: Computationally secure self-healing key distribution with revocation in wireless ad hoc networks. Ad Hoc Netw. 8(6), 597–613 (2010)CrossRefGoogle Scholar
  6. 6.
    Guo, H., Zheng, Y.: On the security of a self-healing group key distribution scheme. Wirel. Pers. Commun. 91(3), 1109–1121 (2016)CrossRefGoogle Scholar
  7. 7.
    Guo, H., Zheng, Y., Zhang, X., Li, Z.: Exponential arithmetic based self-healing group key distribution scheme with backward secrecy under the resource-constrained wireless networks. Sensors 16(5), 609 (2016)CrossRefGoogle Scholar
  8. 8.
    Liu, D., Ning, P., Sun, K.: Efficient self-healing group key distribution with revocation capability. In: ACM Conference on Computer and Communications Security, pp. 231–240. ACM (2003)Google Scholar
  9. 9.
    Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., Dean, D.: Self-healing key distribution with revocation. In: 2002 IEEE Symposium on Security and Privacy, Proceedings, pp. 241–257. IEEE (2002)Google Scholar
  10. 10.
    Sun, X., Wu, X., Huang, C., Zhong, J., Zhong, J.: Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks. Ad Hoc Netw. 37(P2), 324–336 (2016)CrossRefGoogle Scholar
  11. 11.
    Tian, B., Han, S., Dillon, T.S.: An efficient self-healing key distribution scheme. In: New Technologies, Mobility and Security, pp. 1–5. IEEE (2008)Google Scholar
  12. 12.
    Tian, B., Han, S., Dillon, T.S., Das, S.: A self-healing key distribution scheme based on vector space secret sharing and one way hash chains. In: World of Wireless, Mobile and Multimedia Networks, pp. 1–6. IEEE (2008)Google Scholar
  13. 13.
    Wang, G., Wen, T., Guo, Q., Ma, X.: An efficient and secure group key management scheme in mobile ad hoc networks. J. Comput. Res. Dev. 30(3), 937–954 (2010)Google Scholar
  14. 14.
    Wang, Q., Chen, H., Xie, L., Wang, K.: Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks. Secur. Commun. Netw. 5(12), 1363–1374 (2012)CrossRefGoogle Scholar
  15. 15.
    Wang, Q., Chen, H., Xie, L., Wang, K.: One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks. Ad Hoc Netw. 11(8), 2500–2511 (2013)CrossRefGoogle Scholar
  16. 16.
    Xu, Q., He, M.: Improved constant storage self-healing key distribution with revocation in wireless sensor network. Inf. Secur. Appl. 5379, 41–55 (2008)Google Scholar
  17. 17.
    Yang, Y., Zhou, J., Deng, R.H., Bao, F.: Computationally secure hierarchical self-healing key distribution for heterogeneous wireless sensor networks. Inf. Commun. Secur. 5927, 135–149 (2009)Google Scholar
  18. 18.
    Yuan, T., Ma, J., Zhong, Y., Zhang, S.: Efficient self-healing key distribution with limited group membership for communication-constrained networks. In: IEEE/IFIP International Conference on Embedded Ubiquitous Computing, pp. 453–458. IEEE (2008)Google Scholar
  19. 19.
    Yuan, T., Ma, J., Zhong, Y., Zhang, S.: Self-healing key distribution with limited group membership property. In: International Conference on Intelligent Networks Intelligent Systems, pp. 309–312. IEEE (2008)Google Scholar
  20. 20.
    Zhu, S., Setia, S., Xu, S., Jajodia, S.: GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks. J. Comput. Secur. 14(4), 301–325 (2006)CrossRefGoogle Scholar
  21. 21.
    Zou, X., Dai, Y.S.: A robust and stateless self-healing group key management scheme. In: International Conference on Communication Technology, pp. 1–4. IEEE (2006)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.College of Computer Science and TechnologyWuhan University of TechnologyWuhanChina

Personalised recommendations