A Novel Group Key Agreement Scheme for Wireless Sensor Networks Based on Merkle Identity Tree

Article Preview

Abstract:

One of the key issues in wireless sensor networks is to design efficient and secure group key agreement scheme. The Merkle identity tree is firstly introduced, then an efficient scheme based on Merkle identity tree is proposed. With this scheme, the direct and secure communications between any subgroups without retransmission could be implemented. The security of the scheme can be assured under the complexity assumptions. The detailed analysis of the initialization procedure, subgroup key agreement procedure, group communication procedure and rekeying procedure when membership changes, including joining and leaving, shows that the scheme is efficient in computation and communication cost.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

869-875

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] P. Szczechowiak, M. Collier, Practical Identity-Based Key Agreement for Secure Communication in Sensor Networks, Proceedings of 18th International Conference on Computer Communications and Networks, ICCCN 2009, pp.1-6, (2009).

DOI: 10.1109/icccn.2009.5235277

Google Scholar

[2] M.I. Salam, P. Kumar, H. Lee, An Efficient Key Pre-distribution Scheme for Wireless Sensor Network Using Public Key Cryptography, Proceedings of 2010 Sixth International Conference on Networked Computing and Advanced Information Management, NCM 2010, pp.402-407, (2010).

Google Scholar

[3] Z. Zhang, C. Jiang and J. Deng, A Novel Group Key Agreement Protocol for Wireless Sensor Networks, Proceedings of 2010 International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2010, pp.232-233, (2010).

DOI: 10.1109/icmtma.2010.92

Google Scholar

[4] E. Klaoudatou, E. Konstantinou, G. Kambourakiset al, A Survey on Cluster-Based Group Key Agreement Protocols for WSNs, IEEE Communications Surveys & Tutorials, Vol. 13, No. 3, pp.429-442, (2011).

DOI: 10.1109/surv.2011.061710.00109

Google Scholar

[5] Y. Li, D. Chen and T. Newe, Formal Verification of a Key Agreement Protocol for Wireless Sensor Networks, Proceedings of 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, pp.1537-1542, (2012).

DOI: 10.1109/trustcom.2012.163

Google Scholar

[6] L. Wang and C. Wu, Efficient Key Agreement for Large and Dynamic Multicast Groups, International Journal of Network Security, Vol. 3, No. 1, pp.11-20, (2006).

Google Scholar

[7] D. Boneh and M. Franklin, Identity-based Encryption from the Weil Pairing, Advances in Cryptology - CRYPTO 2001, LNCS 2139, pp.213-229, Berlin: Springer-Verlag, (2001).

DOI: 10.1007/3-540-44647-8_13

Google Scholar

[8] S. S. Al-Riyami and K. G. Paterson, Certificateless Public Key Cryptographic, Advances in Cryptology - ASIACRYPT 2003, LNCS 2894, pp.452-473, Berlin: Springer-Verlag, (2003).

DOI: 10.1007/978-3-540-40061-5_29

Google Scholar