Skip to main content

A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks

  • Conference paper
Web Information Systems and Mining (WISM 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5854))

Included in the following conference series:

Abstract

As a result of the growing popularity of wireless sensor networks (WSNs), secure group communication becomes an important research issue for network security because of the popularity of group-oriented applications in WSNs, such as electronic monitoring and collaborative sensing. The secure group key agreement protocol design is crucial for achieving secure group communications. As we all know, most security technologies are currently deployed in wired networks and are not fully applicable to WSNs involving mobile nodes with limited capability. In 2008, we proposed a Blom’s matrix based group key management protocol (BKM) with robust continuity for WSNs. Unfortunately, in this paper we present that the BKM has a security weakness in which participants cannot confirm that their contributions were actually involved in the group key establishment. This is an important property of group key agreement. Therefore, we propose a verified group key agreement protocol (V-BKA) for resource-constrained WSNs. We show that the proposed protocol produces contributory group key agreement. We demonstrate that the proposed protocol is a perfect key management protocol and is well suited for resource- constrained WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine 40(8), 102–116 (2002)

    Article  Google Scholar 

  2. Li, J.H., Bhattacharjee, B., Yu, M., Levy, R.: A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Future Generation Computer Systems 24(8), 860–869 (2008)

    Article  Google Scholar 

  3. Burmester, M., Desmed, Y.: Efficient and Secure Conference key Distribution. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol. 1189, pp. 119–129. Springer, Heidelberg (1997)

    Google Scholar 

  4. Ateniese, G., Steiner, M., Tsudik, G.: Authenticated group key agreement and friends. In: Proceedings of the 5th ACM conference on Computer and communications security, San Francisco, California, United States, pp. 17–26. ACM Press, New York (1998)

    Chapter  Google Scholar 

  5. Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 235–244 (2000)

    Google Scholar 

  6. Nam, J., Lee, J., Kim, S., Won, D.: DDH-based group key agreement in a mobile environment. The Journal of Systems and Software 78(1), 73–83 (2005)

    Article  Google Scholar 

  7. Wen, M., Zheng, Y.F., Ye, W.J., Chen, K.F., Qiu, W.D.: A key management protocol with robust continuity for sensor networks. Journal of Computer Standards & Interfaces 31(4), 642–647 (2009)

    Article  Google Scholar 

  8. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS 2003), pp. 62–72 (2003)

    Google Scholar 

  9. Liu, D., Ning, P., Sun, K.: Efficient Self-Healing Group Key Distribution with Revocation Capability. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 231–240 (2003)

    Google Scholar 

  10. Bohio, M.J., Miri, A.: Self-healing in group key distribution using subset difference method. In: Proceeding of the Third IEEE International Symposium on Network Computing and Applications, NCA 2004 (2004)

    Google Scholar 

  11. Eltoweissy, M., Heydari, H., Morales, L., Sadborough, H.: Combinatorial Optimization of Key Management in Group Communications. J. Network and Systems Management 12(1), 33–50 (2004)

    Article  Google Scholar 

  12. Jiang, Y., Lin, C., Shi, M., Shen, X.: Self-Healing Group Key Distribution Schemes with Time-Limited Node Revocation for Wireless Sensor Networks. Ad Hoc Networks 5(1), 14–23 (2007)

    Article  Google Scholar 

  13. Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  14. Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Transaction on Information and System Security 8(1), 228–258 (2005)

    Article  Google Scholar 

  15. Wang, G., Zhang, W., Cao, G., La Porta, T.: On Supporting Distributed Collaboration in Sensor networks. In: IEEE Military Communications Conference (MILCOM 2003), vol. 2, pp. 752–757 (2003)

    Google Scholar 

  16. Wen, M., Chen, K.F., Zheng, Y.F., Li, H.: A reliable pairwise key-updating scheme for sensor networks. Journal of Software 18(5), 1232–1245 (2007)

    Article  MATH  Google Scholar 

  17. Shaneck, M., Mahadevan, K., Kher, V., Kim, Y.: Remote Software-Based Attestation for Wireless Sensors. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 27–41. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wen, M., Lei, J., Tang, Z., Tian, X., Chen, K., Qiu, W. (2009). A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks. In: Liu, W., Luo, X., Wang, F.L., Lei, J. (eds) Web Information Systems and Mining. WISM 2009. Lecture Notes in Computer Science, vol 5854. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05250-7_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-05250-7_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-05249-1

  • Online ISBN: 978-3-642-05250-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics