{"title":"Self-healing key distribution for large-scale wireless sensor networks","authors":"Qiuhua Wang","doi":"10.1109/IWACI.2010.5585114","DOIUrl":null,"url":null,"abstract":"Recently, T. Yuan et al. proposed a self-healing key distribution with revocation and collusion resistance for wireless sensor networks based on the revocation and participation polynomials. However, we show that T. Yuan's scheme is insecure against the proposed attack. In this paper, we modify the T. Yuan's scheme and further propose a secure and efficient self-healing key distribution scheme to overcome the flaw of T. Yuan's scheme. Our proposed scheme reduces the user's storage overhead to a constant value 2logq bits, and makes the communication overhead be also optimal. Moreover, we analyze our scheme in an appropriate security model and prove that it is unconditionally secure and not only achieves forward and backward secrecy, but also resists to the collusion attack among the revoked users and the new joined users.","PeriodicalId":189187,"journal":{"name":"Third International Workshop on Advanced Computational Intelligence","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third International Workshop on Advanced Computational Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWACI.2010.5585114","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Recently, T. Yuan et al. proposed a self-healing key distribution with revocation and collusion resistance for wireless sensor networks based on the revocation and participation polynomials. However, we show that T. Yuan's scheme is insecure against the proposed attack. In this paper, we modify the T. Yuan's scheme and further propose a secure and efficient self-healing key distribution scheme to overcome the flaw of T. Yuan's scheme. Our proposed scheme reduces the user's storage overhead to a constant value 2logq bits, and makes the communication overhead be also optimal. Moreover, we analyze our scheme in an appropriate security model and prove that it is unconditionally secure and not only achieves forward and backward secrecy, but also resists to the collusion attack among the revoked users and the new joined users.