2007
DOI: 10.1016/j.adhoc.2006.05.007
|View full text |Cite
|
Sign up to set email alerts
|

Self-healing group key distribution with time-limited node revocation for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(39 citation statements)
references
References 16 publications
(15 reference statements)
0
39
0
Order By: Relevance
“…It is the first time to address the authentication on broadcast messages in self-healing key distribution scheme using short signature. This scheme is simple and avoid the deficiencies that incurred by [6] and [13]. According to the exact security proofs for the signature scheme in [12], the signature is secure under the random oracle model.…”
Section: A Analysis Of Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…It is the first time to address the authentication on broadcast messages in self-healing key distribution scheme using short signature. This scheme is simple and avoid the deficiencies that incurred by [6] and [13]. According to the exact security proofs for the signature scheme in [12], the signature is secure under the random oracle model.…”
Section: A Analysis Of Securitymentioning
confidence: 99%
“…Jiang et al in [6] used TEK (Traffic Encryption Key) to prevent non-legitimate nodes from having access to the secret broadcast contents. TEK is re-keyed periodically instead of every node topology change thus there exists time delay.…”
Section: A Self-healing Key Distribution Schemesmentioning
confidence: 99%
“…The schemes [12], [13], [17] are based on vector space access structure instead of Shamir's [14] secret sharing. The hash chain based schemes [8], [5], [10] are computationally secure and are highly efficient compared to the existing unconditionally secure schemes. However, these hash chain based constructions have the fatal defect of not being collusion resistant in the sense that the collusion between new joined users and the revoked users are able to recover all the session keys which they are not entitled to.…”
Section: Introductionmentioning
confidence: 99%
“…Further improvements in efficiency are obtained by relaxing the security slightly -from unconditional to computational [8], [5], [10]. The schemes [12], [13], [17] are based on vector space access structure instead of Shamir's [14] secret sharing.…”
Section: Introductionmentioning
confidence: 99%
“…According to [9], for a lost key distribution broadcast which contains the current session key, a user can recover the lost key by combining information from any key distribution broadcast preceding the lost broadcast with information from any key distribution broadcast following it, as long as the user is a group member in the sessions corresponding to these three broadcasts. Since [9], many self-healing key distribution schemes have been proposed in the literature [10,11,12,13,14,15,16,17,18,19,20].…”
Section: Introductionmentioning
confidence: 99%