Abstract
In the literature, several group key management (GKM) schemes have been proposed and reviewed against passive adversary to analyze the important security requirements of forward and backward secrecy. This article studies a few GKM schemes under more powerful attack defined in IND-SAOA attack game following the random oracle model. The attacker in the game can deliberately compromise or corrupt a legitimate user in the network, which in turn discloses the current keying information associated with that user. In consequence, it is necessary to inspect whether the disclosure of current group key exposes previous group keys, because in that case, backward secrecy is no longer attained. The work shows that the advantage of the attacker in the game is non-negligible for these schemes; on that account, it is concluded that these schemes are insecure and the reason for the same is stated as well. On a concluding note, this article summarizes some observations in the end that occurred during the analysis which are beneficial in construction of a secure GKM scheme.



Similar content being viewed by others
References
Cheikhrouhou O. Secure group communication in wireless sensor networks: a survey. J Netw Comput Appl. 2016;61:115–32.
Kausar F, Hussain S, Park JH, Masood A. Secure group communication with self-healing and rekeying in wireless sensor networks. Int Conf Mobile Ad-hoc Sens Netw. 2007; 737–48.
Yang Y, Zhou J, Deng RH, Bao F. Hierarchical self-healing key distribution for heterogeneous wireless sensor networks. Int Conf Secur Privacy Commun Syst. 2009; 285–95.
Khalid A, Hussain M. A secure group rekeying scheme with compromised node revocation in wireless sensor networks. Int Conf Inf Secur Assur. 2009; 712–21.
Son JH, Lee JS, Seo SW. Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wireless Pers Commun. 2010;52(2):359.
Dini G, Savino IM. \(S^{2}\)RP: a secure and scalable rekeying protocol for wireless sensor networks. IEEE Int Conf Mobile Ad Hoc Sens Syst. 2006;457–66.
Ghafoor A, Sher M, Imran M, Saleem K. A lightweight key freshness scheme for wireless sensor networks. In: 12th IEEE international conference on information technology-new generations, 2015; pp. 169–173.
Eltoweissy M, Heydari MH, Morales L, Sudborough IH. Combinatorial optimization of group key management. J Netw Syst Manage. 2004;12(1):33–50.
Seo SH, Won J, Sultana S, Bertino E. Effective key management in dynamic wireless sensor networks. IEEE Trans Inf Forensics Secur. 2014;10(2):371–83.
Vijayakumar P, Bose S, Kannan A. Chinese remainder theorem based centralised group key management for secure multicast communication. IET Inf Secur. 2014;8(3):179–87.
Mansour A, Malik KM, Alkaff A, Kanaan H. ALMS: Asymmetric Lightweight Centralized Group Key Management Protocol for VANETs. IEEE Trans Intell Transp Syst. 2020;22(3):1663–78.
Guo S, Leung V. A compromise-resilient group rekeying scheme for hierarchical wireless sensor networks. IEEE Wireless Commun Netw Conf. 2010;1–6.
Wen M, Zheng YF, Ye WJ, Chen KF, Qiu WD. A key management protocol with robust continuity for sensor networks. Comput Stand Interfaces. 2009;31(4):642–7.
Vijayakumar P, Naresh R, Jegatha Deborah L, Hafizul Islam SK. An efficient group key agreement protocol for secure P2P communication. Secur Commun Netw. 2016;9(17):3952–65.
Cheikhrouhou O, Koubâa A, Dini G, Abid M. RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks. Pers Ubiquit Comput. 2011;15(8):783–97.
Dini G, Lopriore L. Key propagation in wireless sensor networks. Comput Electr Eng. 2015;41:426–33.
Pandiaraja P, Vijayakumar P, Vijayakumar V, Seshadhri R. Computation efficient attribute based broadcast group key management for secure document access in public cloud. J Inf Sci Eng. 2017;33(3):695–712.
Li X, Wang Y, Vijayakumar P, He D, Kumar N, Ma J. Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles ad-hoc network. IEEE Trans Veh Technol. 2019;68(11):11309–22.
Vinoth R, Deborah LJ, Vijayakumar P, Kumar N. Secure multi-factor authenticated key agreement scheme for industrial IoT. IEEE Internet Things J. 2020;8(5):3801–11.
Purushothama BR, Koti N. Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model. In: 2015 IEEE international conference on advances in computing, communications and informatics (ICACCI). 2015; pp. 1825–1829.
Chaudhari A, Pareek G, Purushothama BR. Security analysis of centralized group key management schemes for wireless sensor networks under strong active outsider adversary model. In: 2017 IEEE international conference on advances in computing, communications and informatics (ICACCI). 2017; pp. 1576–1581.
Purushothama BR, Verma AP. Security analysis of group key management schemes of wireless sensor network under active outsider adversary model. In: 2017 IEEE international conference on advances in computing, communications and informatics (ICACCI). 2017, pp. 988-9-94.
Sawant SV, Pareek G, Purushothama BR. Group key management schemes under strong active adversary model: a security analysis. In: Springer International symposium on security in computing and communication. 2018; pp. 403–418.
Patil SM, BR P. Security analysis of proxy cryptography based group key management schemes for dynamic and wireless networks under active outsider attack model. J Inf Assur Secur. 2019;14(2):48–66.
Acknowledgements
This work is supported by Ministry of Education, Government of India.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Cyber Security and Privacy in Communication Networks” guest edited by Rajiv Misra, R K Shyamsunder, Alexiei Dingli, Natalie Denk, Omer Rana, Alexander Pfeiffer, Ashok Patel, and Nishtha Kesswani.
Rights and permissions
About this article
Cite this article
Sharma, P., Purushothama, B.R. Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game. SN COMPUT. SCI. 2, 261 (2021). https://doi.org/10.1007/s42979-021-00645-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-021-00645-1