Abstract
Secure multicast in a wireless network is possible only if subsets of nodes share different sets of encryption keys. In this paper we propose a key protection and release mechanism based on broadcast tokens, where each node is equipped with protected shares of several encryption keys (node-share) which can be unlocked only when the broadcast tokens arrive. If the node-shares are different for different nodes, each broadcast token could unlock a different set of keys in each node. This makes the network reconfigurable as the information shared between various nodes will change with the accumulation of each new token. A non-perfect secret sharing scheme has been used construct the node-shares and tokens based on a carefully designed codebook which must satisfy certain rules to ensure that the un-encrypted broadcast tokens and the node-shares do not leak the encryption keys. Construction for a three node re-configurable network is discussed under collusion-free conditions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. ACM Conf. on Computer and Communications Security (2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. Symposium on Security and Privacy, pp. 197–213 (May 2003)
Camtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking 15(2), 346–358 (2007)
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Du, W., Han, J.D.Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information System Security 8(2) (May 2005)
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information System Security 8(1), 41–77 (2005)
Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)
Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures. Internet Draft (September 1998)
Wong, C.K., Mohamed, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1) (February 2000)
Karthik, K., Hatzinakos, D.: Multimedia Encoding for Access Control with Traitor Tracing: Balancing Secrecy, Privacy and Traceability. VDM Verlag Dr. Muller (2008) ISBN: 978-3-8364-3638-0
Karthik, K.: A ramp code for fine-grained access control. In: Intl. Conf. on Computer Science and Information Technology, CCSIT (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Karthik, K. (2013). Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_45
Download citation
DOI: https://doi.org/10.1007/978-3-642-38631-2_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38630-5
Online ISBN: 978-3-642-38631-2
eBook Packages: Computer ScienceComputer Science (R0)