Skip to main content

Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens

  • Conference paper
Network and System Security (NSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7873))

Included in the following conference series:

  • 3605 Accesses

Abstract

Secure multicast in a wireless network is possible only if subsets of nodes share different sets of encryption keys. In this paper we propose a key protection and release mechanism based on broadcast tokens, where each node is equipped with protected shares of several encryption keys (node-share) which can be unlocked only when the broadcast tokens arrive. If the node-shares are different for different nodes, each broadcast token could unlock a different set of keys in each node. This makes the network reconfigurable as the information shared between various nodes will change with the accumulation of each new token. A non-perfect secret sharing scheme has been used construct the node-shares and tokens based on a carefully designed codebook which must satisfy certain rules to ensure that the un-encrypted broadcast tokens and the node-shares do not leak the encryption keys. Construction for a three node re-configurable network is discussed under collusion-free conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. ACM Conf. on Computer and Communications Security (2002)

    Google Scholar 

  2. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. Symposium on Security and Privacy, pp. 197–213 (May 2003)

    Google Scholar 

  3. Camtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking 15(2), 346–358 (2007)

    Article  Google Scholar 

  4. Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  5. Du, W., Han, J.D.Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information System Security 8(2) (May 2005)

    Google Scholar 

  6. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  7. Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information System Security 8(1), 41–77 (2005)

    Article  Google Scholar 

  8. Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  9. Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures. Internet Draft (September 1998)

    Google Scholar 

  10. Wong, C.K., Mohamed, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1) (February 2000)

    Google Scholar 

  11. Karthik, K., Hatzinakos, D.: Multimedia Encoding for Access Control with Traitor Tracing: Balancing Secrecy, Privacy and Traceability. VDM Verlag Dr. Muller (2008) ISBN: 978-3-8364-3638-0

    Google Scholar 

  12. Karthik, K.: A ramp code for fine-grained access control. In: Intl. Conf. on Computer Science and Information Technology, CCSIT (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karthik, K. (2013). Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38631-2_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38630-5

  • Online ISBN: 978-3-642-38631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics