A compromise-resilient group rekeying scheme for hierarchical wireless sensor networks

Song Guo, Victor Leung

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

11 Citations (Scopus)

Abstract

The wireless sensor networks (WSNs) are normally operated in unattended, harsh, or hostile environment. The adversaries may easily compromise some sensor nodes and abuse their shared keys to inject false sensing reports or modify the reports sent by other nodes. Many applications in WSNs require secure group communications, which are supported by group keys. Once a malicious node is detected in the group, the group key should be renewed immediately for the network security. Some strategies have been proposed to develop the group rekeying protocol, but most existing schemes suffer the node capture attack. To conquer this problem, we propose a new compromiseresilient group rekeying scheme for hierarchical WSNs in this paper. Compared with existing schemes, our rekeying method possesses the following features: (1) it is robust to the node capture attack, (2) it supports both forward secrecy and backward secrecy, and (3) it has low communication and storage overhead, which are particularly beneficial to the resource-constrained large-scale sensor networks.
Original languageEnglish
Title of host publication2010 IEEE Wireless Communications and Networking Conference, WCNC 2010 - Proceedings
DOIs
Publication statusPublished - 3 Aug 2010
Externally publishedYes
EventIEEE Wireless Communications and Networking Conference 2010, WCNC 2010 - Sydney, NSW, Australia
Duration: 18 Apr 201021 Apr 2010

Conference

ConferenceIEEE Wireless Communications and Networking Conference 2010, WCNC 2010
Country/TerritoryAustralia
CitySydney, NSW
Period18/04/1021/04/10

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'A compromise-resilient group rekeying scheme for hierarchical wireless sensor networks'. Together they form a unique fingerprint.

Cite this