A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless Networks

Self-healing key distribution mechanism can be used to establish session keys within a large and dynamic groups of users over an unreliable network. Mutual-healing key distribution mechanism deals with some deficiency existed in self-healing key distribution mechanism. It is a complementarity to the self-healing mechanism. In this paper, a self-healing key distribution scheme using bilinear pairings is proposed. As far as we know, it is the first self-healing and mutual-healing key distribution scheme based on bilinear pairings. The contributions of this paper are as follows: firstly, the scheme is collusion-free for any coalition of non-authorized users. Secondly, the private key has nothing to do with the number of revoked users and can be reused as long as it is not disclosed. Thirdly, the storage overhead for each user is a constant. In addition, we present technique details on how to realize mutual-healing.

[1]  Donggang Liu,et al.  Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.

[2]  Moni Naor,et al.  Efficient trace and revoke schemes , 2000, International Journal of Information Security.

[3]  Yuan-Shun Dai,et al.  A Robust and Stateless Self-Healing Group Key Management Scheme , 2006, 2006 International Conference on Communication Technology.

[4]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[5]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[6]  Alfredo De Santis,et al.  Design of Self-Healing Key Distribution Schemes , 2004, Des. Codes Cryptogr..

[7]  Albert Y. Zomaya,et al.  Secure localization in wireless sensor networks , 2007 .

[8]  Steven D. Galbraith,et al.  Implementing the Tate Pairing , 2002, ANTS.

[9]  Ali Miri,et al.  Self-healing Group Key Distribution , 2005, Int. J. Netw. Secur..

[10]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .

[11]  Xuemin Shen,et al.  Self-healing group key distribution with time-limited node revocation for wireless sensor networks , 2007, Ad hoc networks.

[12]  Moni Naor,et al.  Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.

[13]  Paulo S. L. M. Barreto,et al.  Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.

[14]  Sourav Mukhopadhyay,et al.  Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[15]  Matthew K. Franklin,et al.  Self-healing key distribution with revocation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[16]  Amos Fiat,et al.  Dynamic Traitor Tracing , 2001, Journal of Cryptology.

[17]  Jessica Staddon,et al.  Sliding-window self-healing key distribution , 2003, SSRS '03.

[18]  Germán Sáez Self-healing Key Distribution Schemes with Sponsorization , 2005, Communications and Multimedia Security.

[19]  Adi Shamir,et al.  The LSD Broadcast Encryption Scheme , 2002, CRYPTO.

[20]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[21]  Ying Wang,et al.  An ID-based broadcast encryption scheme for key distribution , 2005, IEEE Trans. Broadcast..

[22]  Wei-Chi Ku,et al.  An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees , 2003, ICPP Workshops.

[23]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[24]  Germán Sáez On Threshold Self-healing Key Distribution Schemes , 2005, IMACC.