Advertisement

Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens

  • Kannan Karthik
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)

Abstract

Secure multicast in a wireless network is possible only if subsets of nodes share different sets of encryption keys. In this paper we propose a key protection and release mechanism based on broadcast tokens, where each node is equipped with protected shares of several encryption keys (node-share) which can be unlocked only when the broadcast tokens arrive. If the node-shares are different for different nodes, each broadcast token could unlock a different set of keys in each node. This makes the network reconfigurable as the information shared between various nodes will change with the accumulation of each new token. A non-perfect secret sharing scheme has been used construct the node-shares and tokens based on a carefully designed codebook which must satisfy certain rules to ensure that the un-encrypted broadcast tokens and the node-shares do not leak the encryption keys. Construction for a three node re-configurable network is discussed under collusion-free conditions.

Keywords

Reconfigurable Wireless networks Broadcast Key protection Tokens MIX-SPLIT Non-perfect secret sharing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. ACM Conf. on Computer and Communications Security (2002)Google Scholar
  2. 2.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. Symposium on Security and Privacy, pp. 197–213 (May 2003)Google Scholar
  3. 3.
    Camtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking 15(2), 346–358 (2007)CrossRefGoogle Scholar
  4. 4.
    Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  5. 5.
    Du, W., Han, J.D.Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information System Security 8(2) (May 2005)Google Scholar
  6. 6.
    Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)CrossRefGoogle Scholar
  7. 7.
    Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information System Security 8(1), 41–77 (2005)CrossRefGoogle Scholar
  8. 8.
    Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)CrossRefGoogle Scholar
  9. 9.
    Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures. Internet Draft (September 1998)Google Scholar
  10. 10.
    Wong, C.K., Mohamed, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1) (February 2000)Google Scholar
  11. 11.
    Karthik, K., Hatzinakos, D.: Multimedia Encoding for Access Control with Traitor Tracing: Balancing Secrecy, Privacy and Traceability. VDM Verlag Dr. Muller (2008) ISBN: 978-3-8364-3638-0Google Scholar
  12. 12.
    Karthik, K.: A ramp code for fine-grained access control. In: Intl. Conf. on Computer Science and Information Technology, CCSIT (2013)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Kannan Karthik
    • 1
  1. 1.Department of Electronics and Electrical EngineeringIndian Institute of Technology GuwahatiGuwahatiIndia

Personalised recommendations