Abstract
As sensor nodes are deployed in an open and hostile environment, they are vulnerable to various attacks. It is of critical importance to be able to revoke compromised nodes in order to ensure the confidentiality of data traversing in the network. In this work, we propose a novel key revocation scheme which is a hybrid of centralized and distributed methods. The design of our scheme is based on Chan et al. (2005) but eliminates the requirement of prior knowledge. It mainly consists of a voting procedure among nodes and a global revocation by the base station. We also modify existing distributed revocation properties in Chan et al. (2005)’s protocol and extend them to key revocation properties of any hybrid schemes based on the voting process.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Information Security and Cryptography. Springer (2003)
Chan, H., Gligor, V.D., Perrig, A., Muralidharan, G.: On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Transactions on Dependable and Secure Computing 2(3), 233–247 (2005)
Chao, C.H., Yang, C.F., Lin, P.T., Li, J.S.: Novel Distributed Key Revocation Scheme for Wireless Sensor Networks. Security and Communication Networks 6(10), 1271–1280 (2013)
Choo, K.K.R.: Secure Key Establishment. Advances in Information Security, vol. 41. Springer (2009)
Choo, K.K.R., Boyd, C., Hitchcock, Y.: The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun Protocols. Computer Communications 29(15), 2788–2797 (2006)
Jiang, Y., Shi, H.: A key Pre-distribution Scheme for Wireless Sensor Networks Using Hexagonal Deployment Knowledge. Chinese Journal of Electronics 17(3), 520–525 (2008)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Liu, D., Ning, P.: Multi-level μTESLA: Broadcast authentication for distributed sensor networks. Trans. on Embedded Computing Sys. 3(4), 800–836 (2004)
Chattopadhyay, S., Turuk, A.K.: A Scheme for Key Revocation in Wireless Sensor Networks. International Journal on Advanced Computer Engineering and Communication Technology 1(2), 16–20 (2012)
Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: ACM Conference on Computer and Communication Security, pp. 41–47 (2002)
Wang, Y., Ramamurthy, B., Zou, X.: KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks. In: International Conference on Communications, pp. 1260–1265 (2007)
Park, C.H., Zhang, Y.Y., Kim, I.T., Park, M.S.: DLS: Dynamic Level Session Key Revocation Protocol for Wireless Sensor Networks. In: 2010 International Conference Information Science and Applications (ICISA), pp. 1–8 (2010)
Zeng, P., Cao, Z., Choo, K.K.R., Wang, S.: Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks. IEEE Communications Letters 13(6), 426–428 (2009)
Zeng, P., Cao, Z., Choo, K.K.R., Sun, D.: On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks. IEEE Transactions on Consumer Electronics 56(2), 566–569 (2010)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, pp. 197–213 (2013)
Jiang, Y., Zhang, R.N., Du, X.J.: A New Efficient Random Key Revocation Protocol for Wireless Sensor Networks. In: 14th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2013 (2013)
Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: ACM Conference on Computer and Communication Security, pp. 52–61 (2003)
Blom, R.: An optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis and Defenses. In: Third International Workshop on Information Processing in Sensor Networks, IPSN (2004)
Sánchez, D.S., Baldus, H.: Key Management for Mobile Sensor Networks. In: Burmester, M., Yasinsac, A. (eds.) MADNES 2005. LNCS, vol. 4074, pp. 14–26. Springer, Heidelberg (2006)
Moore, T., Clulow, J.: Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 157–168. Springer, Boston (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Ge, M., Choo, KK.R. (2014). A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks. In: Au, M.H., Carminati, B., Kuo, CC.J. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science, vol 8792. Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-11698-3_35
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11697-6
Online ISBN: 978-3-319-11698-3
eBook Packages: Computer ScienceComputer Science (R0)