Skip to main content
Log in

Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game

  • Review Article
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

In the literature, several group key management (GKM) schemes have been proposed and reviewed against passive adversary to analyze the important security requirements of forward and backward secrecy. This article studies a few GKM schemes under more powerful attack defined in IND-SAOA attack game following the random oracle model. The attacker in the game can deliberately compromise or corrupt a legitimate user in the network, which in turn discloses the current keying information associated with that user. In consequence, it is necessary to inspect whether the disclosure of current group key exposes previous group keys, because in that case, backward secrecy is no longer attained. The work shows that the advantage of the attacker in the game is non-negligible for these schemes; on that account, it is concluded that these schemes are insecure and the reason for the same is stated as well. On a concluding note, this article summarizes some observations in the end that occurred during the analysis which are beneficial in construction of a secure GKM scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Cheikhrouhou O. Secure group communication in wireless sensor networks: a survey. J Netw Comput Appl. 2016;61:115–32.

    Article  Google Scholar 

  2. Kausar F, Hussain S, Park JH, Masood A. Secure group communication with self-healing and rekeying in wireless sensor networks. Int Conf Mobile Ad-hoc Sens Netw. 2007; 737–48.

  3. Yang Y, Zhou J, Deng RH, Bao F. Hierarchical self-healing key distribution for heterogeneous wireless sensor networks. Int Conf Secur Privacy Commun Syst. 2009; 285–95.

  4. Khalid A, Hussain M. A secure group rekeying scheme with compromised node revocation in wireless sensor networks. Int Conf Inf Secur Assur. 2009; 712–21.

  5. Son JH, Lee JS, Seo SW. Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wireless Pers Commun. 2010;52(2):359.

    Article  Google Scholar 

  6. Dini G, Savino IM. \(S^{2}\)RP: a secure and scalable rekeying protocol for wireless sensor networks. IEEE Int Conf Mobile Ad Hoc Sens Syst. 2006;457–66.

  7. Ghafoor A, Sher M, Imran M, Saleem K. A lightweight key freshness scheme for wireless sensor networks. In: 12th IEEE international conference on information technology-new generations, 2015; pp. 169–173.

  8. Eltoweissy M, Heydari MH, Morales L, Sudborough IH. Combinatorial optimization of group key management. J Netw Syst Manage. 2004;12(1):33–50.

    Article  Google Scholar 

  9. Seo SH, Won J, Sultana S, Bertino E. Effective key management in dynamic wireless sensor networks. IEEE Trans Inf Forensics Secur. 2014;10(2):371–83.

    Google Scholar 

  10. Vijayakumar P, Bose S, Kannan A. Chinese remainder theorem based centralised group key management for secure multicast communication. IET Inf Secur. 2014;8(3):179–87.

    Article  Google Scholar 

  11. Mansour A, Malik KM, Alkaff A, Kanaan H. ALMS: Asymmetric Lightweight Centralized Group Key Management Protocol for VANETs. IEEE Trans Intell Transp Syst. 2020;22(3):1663–78.

    Article  Google Scholar 

  12. Guo S, Leung V. A compromise-resilient group rekeying scheme for hierarchical wireless sensor networks. IEEE Wireless Commun Netw Conf. 2010;1–6.

  13. Wen M, Zheng YF, Ye WJ, Chen KF, Qiu WD. A key management protocol with robust continuity for sensor networks. Comput Stand Interfaces. 2009;31(4):642–7.

    Article  Google Scholar 

  14. Vijayakumar P, Naresh R, Jegatha Deborah L, Hafizul Islam SK. An efficient group key agreement protocol for secure P2P communication. Secur Commun Netw. 2016;9(17):3952–65.

    Article  Google Scholar 

  15. Cheikhrouhou O, Koubâa A, Dini G, Abid M. RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks. Pers Ubiquit Comput. 2011;15(8):783–97.

    Article  Google Scholar 

  16. Dini G, Lopriore L. Key propagation in wireless sensor networks. Comput Electr Eng. 2015;41:426–33.

    Article  Google Scholar 

  17. Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R. Computation efficient attribute based broadcast group key management for secure document access in public cloud. J Inf Sci Eng. 2017;33(3):695–712.

    MathSciNet  Google Scholar 

  18. Li X, Wang Y, Vijayakumar P, He D, Kumar N, Ma J. Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network. IEEE Trans Veh Technol. 2019;68(11):11309–22.

    Article  Google Scholar 

  19. Vinoth R, Deborah LJ, Vijayakumar P, Kumar N. Secure multi-factor authenticated key agreement scheme for industrial IoT. IEEE Internet Things J. 2020;8(5):3801–11.

    Article  Google Scholar 

  20. Purushothama BR, Koti N. Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model. In: 2015 IEEE international conference on advances in computing, communications and informatics (ICACCI). 2015; pp. 1825–1829.

  21. Chaudhari A, Pareek G, Purushothama BR. Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model. In: 2017 IEEE international conference on advances in computing, communications and informatics (ICACCI). 2017; pp. 1576–1581.

  22. Purushothama BR, Verma AP. Security analysis of group key management schemes of wireless sensor network under active outsider adversary model. In: 2017 IEEE international conference on advances in computing, communications and informatics (ICACCI). 2017, pp. 988-9-94.

  23. Sawant SV, Pareek G, Purushothama BR. Group key management schemes under strong active adversary model: a security analysis. In: Springer International symposium on security in computing and communication. 2018; pp. 403–418.

  24. Patil SM, BR P. Security analysis of proxy cryptography based group key management schemes for dynamic and wireless networks under active outsider attack model. J Inf Assur Secur. 2019;14(2):48–66.

    Google Scholar 

Download references

Acknowledgements

This work is supported by Ministry of Education, Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Payal Sharma.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Cyber Security and Privacy in Communication Networks” guest edited by Rajiv Misra, R K Shyamsunder, Alexiei Dingli, Natalie Denk, Omer Rana, Alexander Pfeiffer, Ashok Patel, and Nishtha Kesswani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, P., Purushothama, B.R. Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game. SN COMPUT. SCI. 2, 261 (2021). https://doi.org/10.1007/s42979-021-00645-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-021-00645-1

Keywords

Navigation

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy