2010 IEEE International Conference on Communications 2010
DOI: 10.1109/icc.2010.5502594
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks

Abstract: The main property of the self-healing key distribution scheme is that even if during a certain session some broadcast messages are lost due to network faults, the users are still capable of recovering lost session keys on their own, without requesting additional transmission from the group manager. In this paper, we propose and analyze an efficient self-healing key distribution scheme based on vector space secret sharing and one way hash function. We prove that our scheme achieves both forward and backward sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
10
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…Secure key distribution schemes for group communications allow to establish a secure multicast communication between a group manager and group members through an unreliable broadcast channel (Gu & Xue, 2010). The article classifies, analyzes, and compares the most significant key distribution schemes by looking at the selective key distribution algorithms, the predistributed secret data management, and the self-healing mechanisms (Jung & Jung, 2013).…”
Section: Literature Surveymentioning
confidence: 99%
“…Secure key distribution schemes for group communications allow to establish a secure multicast communication between a group manager and group members through an unreliable broadcast channel (Gu & Xue, 2010). The article classifies, analyzes, and compares the most significant key distribution schemes by looking at the selective key distribution algorithms, the predistributed secret data management, and the self-healing mechanisms (Jung & Jung, 2013).…”
Section: Literature Surveymentioning
confidence: 99%
“…7,8,14,16,18,19 That is, during a certain session, even if some broadcast packets get lost, users are still capable of recovering the group key, for that session, simply by using the packets they will receive at the beginning of a subsequent one, without requesting additional transmission from the GM. 7,8,14,16,18,19 That is, during a certain session, even if some broadcast packets get lost, users are still capable of recovering the group key, for that session, simply by using the packets they will receive at the beginning of a subsequent one, without requesting additional transmission from the GM.…”
Section: Introductionmentioning
confidence: 99%
“…[7][8][9][10][11][12][13][14][15] These are useful in several settings such as group keys needed to be used for a short period because of frequent changes in the group structure. 12,14,16 In these protocols, group lifetime is divided into epochs called sessions, 7,8,12,17 where each session has a unique group key. At the beginning of each session, the GM transmits a broadcast message in order to provide a common key, called the session key, to each member of the group.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations