Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2007.14-C.7.553

Communication-Efficient Representations for Certificate Revocation in Wireless Sensor Network  

Maeng, Young-Jae (인하대학교 정보통신대학원)
Mohaisen, Abedelaziz (인하대학교 정보통신대학원)
Lee, Kyung-Hee (수원대학교 전기공학)
Nyang, Dae-Hun (인하대학교 정보통신대학원)
Abstract
In this paper, we introduce a set of structures and algorithms for communication efficient public key revocation in wireless sensor networks. Unlike the traditional networks, wireless sensor network is subjected to resources constraints. Thus, traditional public key revocation mechanisms such like the ordinary certificate revocation list is unsuitable to be used. This unsuitability is due to the huge size of required representation space for the different keys' identifiers and the revocation communication as the set of revoked keys grow. In this work, we introduce two communication-efficient schemes for the certificate revocation. In the first scheme, we utilize the complete subtree mechanism for the identifiers representation which is widely used in the broadcast encryption/user revocation. In the second scheme, we introduce a novel bit vector representation BVS which uses vector of relative identifiers occurrence representation. We introduce different revocation policies and present corresponding modifications of our scheme. Finally, we show how the encoding could reduce the communication overhead as well. Simulation results and comparisons are provided to show the value of our work.
Keywords
Certificate Revocation; Key Pre-Distribution; Run Length Encoding; Cover Set Problem; Sensor Networks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks, IEEE Symp on S&P, pp.197-213, May 2003
2 Nyang D., Mohaisen A.: Cooperative Public Key Authentication Scheme for Wireless Sensor Networks, To appear in proceeding of UIC06, LNCS, Sep 2006
3 Rivest, R. L., Shamir, A., Adleman, L. M.: A method for obtaining digital signatures and public-key cryptosystems, Com. of the ACM, 21(2): pp.120-126, 1978   DOI   ScienceOn
4 Gura N., Patel A., Wander A., Eberle A., Shantz S. C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, CHES pp.119-132, 2004
5 Wander A., Gura N., Eberle H., Gupta V., Shantz S.C.: Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks, PerCom'05, pp.324-328   DOI
6 Watro R.J., Kong D., Cuti S.F., Gardiner Ch., Lynn Ch., Kruus P.: TinyPK: securing sensor networks with public key technology, SASN'04, 59-64, pp.10-2004   DOI
7 Naor D., Naor M., Lotspiech J.: Revocation and Tracing Schemes for Stateless Receivers. CRYPTO : pp.41-62, 2001   DOI   ScienceOn
8 Fiat A., Naor M.: Broadcast Encryption. CRYPTO : pp.480-491, 1993
9 Koblitz N., Menezes A., Vanstone S.: The State of Elliptic Curve Cryptography, Designs, Codes and Cryptography, 19, 173-193, 2000   DOI
10 Du, W., Deng, J., Han, Y. S., and Varshney, P.: A pair-wise key pre-distribution scheme for wireless sensor networks, ACM CCS'03, pp.42-51, 2003   DOI
11 Liu, D., Ning, P.: Establishing Pair-wise keys in distributed sensor networks, ACM CCS'03, pp.52-61, 2003   DOI
12 Malan D.J., Welsh A., Smith M.D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Crypt., IEEE SECON'04, pp.71-80   DOI
13 Du W., Wang R., and Ning P.: An Efficient Scheme for Authenticating Public Keys in Sensor Networks. Proc. of The sixth ACM MobiHoc, pp.58-67   DOI
14 Pottie G. J. and Kaiser W. J. Wireless integrated network sensors. Communications of the ACM, pp. 51-58, May 2000   DOI   ScienceOn
15 Eschenauer, L., Gligor, V. D.: A key management scheme for distributed sensor networks, In Proc. of the ninth ACM CCS'02, pp.41-47, 2003   DOI