Browse > Article
http://dx.doi.org/10.13089/JKIISC.2011.21.3.75

Fast Group Rekeying Scheme for Secure Multicast in Wireless Sensor Networks  

NamGoong, Wan (Graduate School for Information Security, Korea University)
Cho, Kwan-Tae (Graduate School for Information Security, Korea University)
Lee, Dong-Hoon (Graduate School for Information Security, Korea University)
Abstract
Messages need to transmit to the neighbors securely in wireless sensor network, because a sensor node is deployed in hostile area. Thus it is necessary to support secure communication. One of the most important communication part is secure multicast. Especially, group rekeying is a big problem for multicast key management. So, group rekeying must be proceed securely when secrete information is exposed by attacker. Many group rekeying schemes have been studied for ad hoc networks. However, these schemes are Ill1desirable in WSNs. In this paper, we proposed a novel group rekeying scheme in WSNs that it has very powerful security.
Keywords
Sensor networks; Multicast security; group-key; rekey;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Wong, M. Gouda, and S. Lam, "Secure Group Communications Using Key Graphs," IEEE/ACM Transactions on networking, vol. 8, no. 1, Feb. 2000
2 K. Ren, W. Lou, and Y. Zhang, "Multi-user Broadcast Authentication in Wireless Sensor Networks," IEEE Communications Society Conference, pp. 223-232, June 2007
3 Y. Wang, G. Attebury, and B. Ramamurthy "A Survey of Security Issues in Wireless Sensor Networks," IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, 2006.
4 R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Construction," IEEE INFOCOM, pp. 708-176, Mar. 1999
5 M. Jadliwala, Z. Sheng, S.J. Upadhyaya, Q. Chunming, and J.P. Hubaux, "Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes," Mobile Computing, IEEE Transactions on, vol. 9, no. 6, pp. 810-823, Apr. 2010   DOI
6 A. Liu and P. Ning, "TinyECC : A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks," Information Processing in Sensor Networks(IPSN), pp. 245-256, 2008
7 K. Piotrowski, P. Langendoerfer, and S. Peter, "How public key cryptography influences wireless sensor node lifetime," The International Workshop on Scalable Ad Hoc and Sensor Networks(SASN), pp. 169-176, 2006
8 A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C.Shantz, "Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks," IEEE International Conf. Pervasive Computing and Communications (PerCom), pp. 324-328, Mar. 2005
9 T.V. Srinath, "Localization in resource constrained sensor networks using a mobile beacon with in-ranging," Wireless and Optical Communications Networks, pp.5, Apr. 2006
10 "The Network Simulator, ns-2," available at http://www.isi.edu/nsnam/ns
11 T. Chiang and Y. Huang, "Group Keys and the Multicast Security in Ad Hoc Networks," International Conference on Parallel Processing Workshops, pp. 385-390, Oct. 2003
12 F. Anjum, "Location dependent key management in sensor networks without using deployment knowledge," Wireless Networks, vol. 16, no. 6, pp. 1587-1600, Oct. 2008
13 A. Seshadri, A. Perrig, L.V. Doorn, and P. Khosla, "SWATT : Software-based Attestation for Embedded Devices," IEEE Symposium on Security and Privacy, May 2004
14 T Shi-Chun, T Wen-Guey, and Z Kun-Yi, "Key establishment schemes against storage-bounded adversaries in wireless sensor networks," Wireless Communications, IEEE Transactions on, vol. 8, no. 3, pp. 1218-1222, Mar. 2009   DOI
15 S. Marti, T. Giuli, T. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," ACM MobiCom, pp. 255-265, Aug. 2000
16 G. Wang, W. Zhang, and G. Cao, T. La Porta, "On Supporing Distribued Collaboration in Sensor Networks," IEEE Military Communications Conference (MILCOM), pp. 752-757, Oct. 2003
17 K. Ren, W. Lou, B. Zhu, and S. Jajodia "Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad Hoc Group Formation," IEEE Transactions on vehicular technology, vol.58, no. 4, pp. 2018-2029, May 2009   DOI
18 J. Hall, M. Barbeau, and E. Kranakis, "Detection of Transient in Radio Frequency Fingerprinting Using Phase Characteristics of Signals," IASTED International Conference on Wireless and Optical Communication (WOC), pp. 13-18, May 2003
19 W. Zhang, S. Zhu, and G. Cao, "Predistribution and Local Collaboration -based Group Rekeying for Wireless Sensor Networks," Ad Hoc Network, vol. 7, pp. 1229-1242, Aug. 2009   DOI   ScienceOn
20 M. Bouassida, I. Chrisment and O. Festor, "Group Key Management in Manets," International Journal of Network Security, pp. 67-79 2008
21 A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D. Culler, "SPINS : Security Protocols for Sensor Networks," Wireless Network, vol.8, no.5, pp. 521-534, Sep. 2002   DOI   ScienceOn
22 M. Bouassida, I. Chrisment and O. Festor, "An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks," NETWORKING LNCS 3042, pp. 725-742, 2004
23 M. Bouassida, I. Chrisment and O. Festor, "Efficient Clustring for Multicast Key Distribution in MANET," NETWORKING LNCS pp. 138-153, 2005
24 L. Laxos and R. Poovendram, "Energy -Aware Secure Multicast Communication in Ad Hoc Netwroks Using Geographical Location Information," IEEE International Conference on Acoustics Speech and Signal Processing, vol. 4 pp. IV-201-4, 2003
25 S. Mittra, "Iolus : A framework for scalable secure multicasting," ACM Special Interest Group on Data Communication, pp. 277-288, 1997
26 S. Zhu, S. Setia, S. Xu, and S. Jajodia, "GKMPAN : An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks," ACM Mobiquitous, pp. 42-51, Aug. 2004
27 R.D. Pietro, L. Mancinim, Y. Law, S. Etalle, and P, Havinga, "LKHW:A Directed Diffusion-based Secure Multicast Scheme for Wireless Sensor Networks," International Conference on Parallel Processing Workshops, pp. 397-406, Oct. 2003
28 T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, "Secure Multicast Groups on Ad Hoc Networks," ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 94-102, 2003
29 A. Perrig, D. Song, and D. tyhar, "ELK, A New Protocol for Efficient Large Group Key Distribution," IEEE Signal Processing, pp. 247-262, May 2001