Please use this identifier to cite or link to this item:
https://doi.org/10.1109/WCNC.2007.549
DC Field | Value | |
---|---|---|
dc.title | Improved self-healing key distribution with revocation in wireless sensor network | |
dc.contributor.author | Dutta, R. | |
dc.contributor.author | Mukhopadhyay, S. | |
dc.date.accessioned | 2013-07-04T08:13:47Z | |
dc.date.available | 2013-07-04T08:13:47Z | |
dc.date.issued | 2007 | |
dc.identifier.citation | Dutta, R.,Mukhopadhyay, S. (2007). Improved self-healing key distribution with revocation in wireless sensor network. IEEE Wireless Communications and Networking Conference, WCNC : 2965-2970. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/WCNC.2007.549" target="_blank">https://doi.org/10.1109/WCNC.2007.549</a> | |
dc.identifier.isbn | 1424406595 | |
dc.identifier.issn | 15253511 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/40850 | |
dc.description.abstract | In this paper, we develop and analyze a new self-healing key distribution scheme with revocation capability, scalable to very large groups in unreliable ad hoc wireless environment. The main emphasis of our proposed scheme is that it has significant improvement in terms of both storage and communication overhead compared to the previous works. The storage overhead of our self-healing key distribution with t revocation capability is O((t + l) log q), and the communication complexity is O((t + 1 + j) log q), where q is a large prime and j is the current session number. In contrast to the previous schemes, we use a different and more efficient self-healing technique. On a more positive note, our scheme enables reuse of personal key of a user to next m sessions and consequently, overcomes the restriction of m sessions in Setup phase, unlike previous works. Moreover, we analyze our scheme in an appropriate security framework and proved that it is unconditionally secure and achieves both forward secrecy and backward secrecy. © 2007 IEEE. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/WCNC.2007.549 | |
dc.source | Scopus | |
dc.subject | Forward and backward secrecy | |
dc.subject | Revocation | |
dc.subject | Self-healing | |
dc.subject | Session key distribution | |
dc.subject | Unconditional security | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1109/WCNC.2007.549 | |
dc.description.sourcetitle | IEEE Wireless Communications and Networking Conference, WCNC | |
dc.description.page | 2965-2970 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.