Communications of the ACM
Self-Healing Key Distribution with Revocation
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
Sliding-window self-healing key distribution
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Collusion attack on a self-healing key distribution with revocation in wireless sensor networks
WISA'10 Proceedings of the 11th international conference on Information security applications
Keeping group communications private: An up-to-date review on centralized secure multicast
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Hi-index | 0.00 |
In this paper, we analyze an existing constant storage self-healing key distribution scheme in wireless sensor networks. Then, we show two attacks and propose a modified scheme to overcome the two flaws. At last, we propose a new self-healing key distribution scheme to improve the modified scheme. The most prominent properties of the new proposed scheme are as follows: achieving forward and backward secrecy and resisting to a collusion attack. So that a revoked user with the assistance of the newly joined users cannot get any information of group session keys which it is not entitled to get.