Abstract
As a result of the growing popularity of wireless sensor networks (WSNs), secure group communication becomes an important research issue for network security because of the popularity of group-oriented applications in WSNs, such as electronic monitoring and collaborative sensing. The secure group key agreement protocol design is crucial for achieving secure group communications. As we all know, most security technologies are currently deployed in wired networks and are not fully applicable to WSNs involving mobile nodes with limited capability. In 2008, we proposed a Blom’s matrix based group key management protocol (BKM) with robust continuity for WSNs. Unfortunately, in this paper we present that the BKM has a security weakness in which participants cannot confirm that their contributions were actually involved in the group key establishment. This is an important property of group key agreement. Therefore, we propose a verified group key agreement protocol (V-BKA) for resource-constrained WSNs. We show that the proposed protocol produces contributory group key agreement. We demonstrate that the proposed protocol is a perfect key management protocol and is well suited for resource- constrained WSNs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine 40(8), 102–116 (2002)
Li, J.H., Bhattacharjee, B., Yu, M., Levy, R.: A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Future Generation Computer Systems 24(8), 860–869 (2008)
Burmester, M., Desmed, Y.: Efficient and Secure Conference key Distribution. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 119–129. Springer, Heidelberg (1997)
Ateniese, G., Steiner, M., Tsudik, G.: Authenticated group key agreement and friends. In: Proceedings of the 5th ACM conference on Computer and communications security, San Francisco, California, United States, pp. 17–26. ACM Press, New York (1998)
Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 235–244 (2000)
Nam, J., Lee, J., Kim, S., Won, D.: DDH-based group key agreement in a mobile environment. The Journal of Systems and Software 78(1), 73–83 (2005)
Wen, M., Zheng, Y.F., Ye, W.J., Chen, K.F., Qiu, W.D.: A key management protocol with robust continuity for sensor networks. Journal of Computer Standards & Interfaces 31(4), 642–647 (2009)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS 2003), pp. 62–72 (2003)
Liu, D., Ning, P., Sun, K.: Efficient Self-Healing Group Key Distribution with Revocation Capability. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 231–240 (2003)
Bohio, M.J., Miri, A.: Self-healing in group key distribution using subset difference method. In: Proceeding of the Third IEEE International Symposium on Network Computing and Applications, NCA 2004 (2004)
Eltoweissy, M., Heydari, H., Morales, L., Sadborough, H.: Combinatorial Optimization of Key Management in Group Communications. J. Network and Systems Management 12(1), 33–50 (2004)
Jiang, Y., Lin, C., Shi, M., Shen, X.: Self-Healing Group Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks. Ad Hoc Networks 5(1), 14–23 (2007)
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Transaction on Information and System Security 8(1), 228–258 (2005)
Wang, G., Zhang, W., Cao, G., La Porta, T.: On Supporting Distributed Collaboration in Sensor networks. In: IEEE Military Communications Conference (MILCOM 2003), vol. 2, pp. 752–757 (2003)
Wen, M., Chen, K.F., Zheng, Y.F., Li, H.: A reliable pairwise key-updating scheme for sensor networks. Journal of Software 18(5), 1232–1245 (2007)
Shaneck, M., Mahadevan, K., Kher, V., Kim, Y.: Remote Software-Based Attestation for Wireless Sensors. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 27–41. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wen, M., Lei, J., Tang, Z., Tian, X., Chen, K., Qiu, W. (2009). A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks. In: Liu, W., Luo, X., Wang, F.L., Lei, J. (eds) Web Information Systems and Mining. WISM 2009. Lecture Notes in Computer Science, vol 5854. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05250-7_44
Download citation
DOI: https://doi.org/10.1007/978-3-642-05250-7_44
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05249-1
Online ISBN: 978-3-642-05250-7
eBook Packages: Computer ScienceComputer Science (R0)