Skip to main content
Log in

Securing polynomial based group key management scheme against strong active adversary model

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The literature on group key management focuses solely on the security of schemes under passive adversary model. But they lack security against a more realistic adversary known as strong active outsider adversary. We analyzed an existing polynomial-based key management scheme against strong active adversary and found that the scheme is insecure. In addition to this, we proposed a polynomial-based scheme using a one way function. We show that the proposed scheme is secure against the strong active adversarial model. The proposed scheme is also efficient in comparison to existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Zhang J, Li H, Li J (2018) Key establishment scheme for wireless sensor networks based on polynomial and random key predistribution scheme. Ad Hoc Networks 71:68–77. https://doi.org/10.1016/j.adhoc.2017.12.006

    Article  Google Scholar 

  2. Dinker AG, Sharma V (2018) Trivariate polynomial based key management scheme (tpb-kms) in hierarchical wireless sensor networks. In: Perez GM, Tiwari S, Trivedi MC, Mishra KK (eds) Ambient communications and computer systems. Springer, Singapore, pp 283–290

    Google Scholar 

  3. Mohammadi M, Keshavarz-Haddad A (2017) A new distributed group key management scheme for wireless sensor networks. In: 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pp. 37–41. https://doi.org/10.1109/ISCISC.2017.8488368

  4. Mahmood Z, Ning H, Ghafoor A (2017) A polynomial subset-based efficient multi-party key management system for lightweight device networks. Sensors 17(4). https://doi.org/10.3390/s17040670

  5. Nafi M, Bouzefrane S, Omar M (2021) Efficient and lightweight polynomial-based key management scheme for dynamic networks. In: Bouzefrane S, Laurent M, Boumerdassi S, Renault E (eds) Mobile, secure, and programmable networking. Springer, Cham, pp 110–122

    Chapter  Google Scholar 

  6. Hamsha K, Nagaraja GS (2019) Threshold cryptography based light weight key management technique for hierarchical wsns. In: Kumar N, Venkatesha Prasad R (eds) Ubiquitous communications and network computing. Springer, Cham, pp 188–197

    Chapter  Google Scholar 

  7. Albakri A, Harn L, Song S (2019) Hierarchical key management scheme with probabilistic security in a wireless sensor network (wsn). Security Commun Netw 2019:3950129. https://doi.org/10.1155/2019/3950129

    Article  Google Scholar 

  8. Zou X, Dai Y-S, Bertino E (2008) A practical and flexible key management mechanism for trusted collaborative computing, 538–546. https://doi.org/10.1109/infocom.2008.102

  9. Chaudhari A, Pareek G, Purushothama BR (2017)Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1576–1581. https://doi.org/10.1109/ICACCI.2017.8126066

  10. Purushothama BR, Koti N (2015) Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model. In: 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015, 1825–1829. https://doi.org/10.1109/ICACCI.2015.7275882

  11. Sawant SV, Pareek G, Purushothama BR (2019) Group key management schemes under strong active adversary model: a security analysis vol. 969, pp. 403–418. Springer, ??? (2019). https://doi.org/10.1007/978-981-13-5826-5_31

  12. Patil SM, Purushothama BR (2019) Security analysis of proxy cryptography based group key management schemes for dynamic and wireless networks under active outsider attack model 14:48–66

  13. Odelu V, Das AK, Goswami A (2012) A novel key management mechanism for dynamic hierarchical access control based on linear polynomials. Commun Comput Inform Sci 335 CCIS, 1–10. https://doi.org/10.1007/978-3-642-34135-9_1

  14. Piao Y, Kim J, Tariq U, Hong M (2013) Polynomial-based key management for secure intra-group and inter-group communication. Comput Math Appl 65:1300–1309. https://doi.org/10.1016/j.camwa.2012.02.008

    Article  MathSciNet  Google Scholar 

  15. Kamal AA (2013) Cryptanalysis of a polynomial-based key management scheme for secure group communication. Int J Netw Secur 15:68–70

    Google Scholar 

  16. Chang CC, Harn L, Cheng TF (2014) Notes on ”polynomial-based key management for secure intra-group and inter-group communication.” Int J Netw Secur 16:143–148

  17. Jiang R, Lu R, Luo J, Lai C, Shen XS (2015) Efficient self-healing group key management with dynamic revocation and collusion resistance for scada in smart grid. Sec Commun Netw 8(6):1026–1039. https://doi.org/10.1002/sec.1057

    Article  Google Scholar 

  18. Ganesan VC, Periyakaruppan A, Lavanya R (2016) Cost-effective polynomial-based multicast-unicast key distribution framework for secure group communication in ipv6 multicast networks. IET Inform Secur 10(5), 252–261 https://ietresearch.onlinelibrary.wiley.com/doi/pdf/10.1049/iet-ifs.2015.0398. https://doi.org/10.1049/iet-ifs.2015.0398

  19. Sun X, Wu X, Huang C, Xu Z, Zhong J (2016) Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks. Ad Hoc Netw 37:324–336. https://doi.org/10.1016/j.adhoc.2015.08.027

    Article  Google Scholar 

  20. Zhang G, Yang H, Tian X, Wu Y (2018) A novel key pre-distributed scheme based on sub-regions division for distributed wireless sensor networks. In: 2018 10th International conference on communication software and networks (ICCSN), pp. 275–280. https://doi.org/10.1109/ICCSN.2018.8488304

  21. Jing Z, Chen M, Hongbo F (2017) Wsn key management scheme based on fully bomomorphic encryption. In: 2017 29th Chinese control and decision conference (CCDC), pp. 7304–7309. https://doi.org/10.1109/CCDC.2017.7978504

  22. Albakri A, Harn L, Maddumala M (2019) Polynomial-based lightweight key management in a permissioned blockchain. In: 2019 IEEE Conference on Communications and Network Security (CNS), pp. 1–9. https://doi.org/10.1109/CNS.2019.8802723

  23. Albakri A, Maddumala M, Harn L (2018) Hierarchical polynomial-based key management scheme in fog computing. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/ 12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE), pp. 1593–1597. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00231

  24. Guo H, Zheng Y, Li X, Li Z, Xia C (2018) Self-healing group key distribution protocol in wireless sensor networks for secure iot communications. Future Generation Comput Syst 89:713–721. https://doi.org/10.1016/j.future.2018.07.009

    Article  Google Scholar 

  25. Gautam AK, Kumar R (2021) A key management scheme using (p, q)-lucas polynomials in wireless sensor network. China Commun 18(11), 210–228. https://doi.org/10.23919/JCC.2021.11.015

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Payal Sharma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, P., Purushothama, B.R. Securing polynomial based group key management scheme against strong active adversary model. Int. j. inf. tecnol. 14, 2329–2334 (2022). https://doi.org/10.1007/s41870-022-00990-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-022-00990-1

Keywords

Navigation