Abstract
The literature on group key management focuses solely on the security of schemes under passive adversary model. But they lack security against a more realistic adversary known as strong active outsider adversary. We analyzed an existing polynomial-based key management scheme against strong active adversary and found that the scheme is insecure. In addition to this, we proposed a polynomial-based scheme using a one way function. We show that the proposed scheme is secure against the strong active adversarial model. The proposed scheme is also efficient in comparison to existing schemes.
Similar content being viewed by others
References
Zhang J, Li H, Li J (2018) Key establishment scheme for wireless sensor networks based on polynomial and random key predistribution scheme. Ad Hoc Networks 71:68–77. https://doi.org/10.1016/j.adhoc.2017.12.006
Dinker AG, Sharma V (2018) Trivariate polynomial based key management scheme (tpb-kms) in hierarchical wireless sensor networks. In: Perez GM, Tiwari S, Trivedi MC, Mishra KK (eds) Ambient communications and computer systems. Springer, Singapore, pp 283–290
Mohammadi M, Keshavarz-Haddad A (2017) A new distributed group key management scheme for wireless sensor networks. In: 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pp. 37–41. https://doi.org/10.1109/ISCISC.2017.8488368
Mahmood Z, Ning H, Ghafoor A (2017) A polynomial subset-based efficient multi-party key management system for lightweight device networks. Sensors 17(4). https://doi.org/10.3390/s17040670
Nafi M, Bouzefrane S, Omar M (2021) Efficient and lightweight polynomial-based key management scheme for dynamic networks. In: Bouzefrane S, Laurent M, Boumerdassi S, Renault E (eds) Mobile, secure, and programmable networking. Springer, Cham, pp 110–122
Hamsha K, Nagaraja GS (2019) Threshold cryptography based light weight key management technique for hierarchical wsns. In: Kumar N, Venkatesha Prasad R (eds) Ubiquitous communications and network computing. Springer, Cham, pp 188–197
Albakri A, Harn L, Song S (2019) Hierarchical key management scheme with probabilistic security in a wireless sensor network (wsn). Security Commun Netw 2019:3950129. https://doi.org/10.1155/2019/3950129
Zou X, Dai Y-S, Bertino E (2008) A practical and flexible key management mechanism for trusted collaborative computing, 538–546. https://doi.org/10.1109/infocom.2008.102
Chaudhari A, Pareek G, Purushothama BR (2017)Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1576–1581. https://doi.org/10.1109/ICACCI.2017.8126066
Purushothama BR, Koti N (2015) Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model. In: 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015, 1825–1829. https://doi.org/10.1109/ICACCI.2015.7275882
Sawant SV, Pareek G, Purushothama BR (2019) Group key management schemes under strong active adversary model: a security analysis vol. 969, pp. 403–418. Springer, ??? (2019). https://doi.org/10.1007/978-981-13-5826-5_31
Patil SM, Purushothama BR (2019) Security analysis of proxy cryptography based group key management schemes for dynamic and wireless networks under active outsider attack model 14:48–66
Odelu V, Das AK, Goswami A (2012) A novel key management mechanism for dynamic hierarchical access control based on linear polynomials. Commun Comput Inform Sci 335 CCIS, 1–10. https://doi.org/10.1007/978-3-642-34135-9_1
Piao Y, Kim J, Tariq U, Hong M (2013) Polynomial-based key management for secure intra-group and inter-group communication. Comput Math Appl 65:1300–1309. https://doi.org/10.1016/j.camwa.2012.02.008
Kamal AA (2013) Cryptanalysis of a polynomial-based key management scheme for secure group communication. Int J Netw Secur 15:68–70
Chang CC, Harn L, Cheng TF (2014) Notes on ”polynomial-based key management for secure intra-group and inter-group communication.” Int J Netw Secur 16:143–148
Jiang R, Lu R, Luo J, Lai C, Shen XS (2015) Efficient self-healing group key management with dynamic revocation and collusion resistance for scada in smart grid. Sec Commun Netw 8(6):1026–1039. https://doi.org/10.1002/sec.1057
Ganesan VC, Periyakaruppan A, Lavanya R (2016) Cost-effective polynomial-based multicast-unicast key distribution framework for secure group communication in ipv6 multicast networks. IET Inform Secur 10(5), 252–261 https://ietresearch.onlinelibrary.wiley.com/doi/pdf/10.1049/iet-ifs.2015.0398. https://doi.org/10.1049/iet-ifs.2015.0398
Sun X, Wu X, Huang C, Xu Z, Zhong J (2016) Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks. Ad Hoc Netw 37:324–336. https://doi.org/10.1016/j.adhoc.2015.08.027
Zhang G, Yang H, Tian X, Wu Y (2018) A novel key pre-distributed scheme based on sub-regions division for distributed wireless sensor networks. In: 2018 10th International conference on communication software and networks (ICCSN), pp. 275–280. https://doi.org/10.1109/ICCSN.2018.8488304
Jing Z, Chen M, Hongbo F (2017) Wsn key management scheme based on fully bomomorphic encryption. In: 2017 29th Chinese control and decision conference (CCDC), pp. 7304–7309. https://doi.org/10.1109/CCDC.2017.7978504
Albakri A, Harn L, Maddumala M (2019) Polynomial-based lightweight key management in a permissioned blockchain. In: 2019 IEEE Conference on Communications and Network Security (CNS), pp. 1–9. https://doi.org/10.1109/CNS.2019.8802723
Albakri A, Maddumala M, Harn L (2018) Hierarchical polynomial-based key management scheme in fog computing. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/ 12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE), pp. 1593–1597. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00231
Guo H, Zheng Y, Li X, Li Z, Xia C (2018) Self-healing group key distribution protocol in wireless sensor networks for secure iot communications. Future Generation Comput Syst 89:713–721. https://doi.org/10.1016/j.future.2018.07.009
Gautam AK, Kumar R (2021) A key management scheme using (p, q)-lucas polynomials in wireless sensor network. China Commun 18(11), 210–228. https://doi.org/10.23919/JCC.2021.11.015
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sharma, P., Purushothama, B.R. Securing polynomial based group key management scheme against strong active adversary model. Int. j. inf. tecnol. 14, 2329–2334 (2022). https://doi.org/10.1007/s41870-022-00990-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-022-00990-1