Hierarchical Multi-Party Key Establishment for Wireless Networks
نویسندگان
چکیده
A common property of practically all multi-party key agreement protocols is that they are non-hierarchical, i.e., they do not support user hierarchies. However, in real life it is likely that members of groups and organizations differ in ranking according to their job positions. Thus, it is reasonable that participants of a certain ranking could access more privileged information than participants of lower rankings. Hierarchical access control (HAC) schemes address this issue, but in contrast to provide secure distribution of hierarchically-arranged short-term session keys, HAC schemes provide secure distribution of hierarchicallyarranged long-term, predefined keys. In this paper, we present an efficient hierarchical multi-party key agreement protocol that is wellsuitable for wireless networks. We also present a closely related hierarchical centralized key distribution protocol for totally-ordered and partially-ordered security classes.
منابع مشابه
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملMLCA: A Multi-Level Clustering Algorithm for Routing in Wireless Sensor Networks
Energy constraint is the biggest challenge in wireless sensor networks because the power supply of each sensor node is a battery that is not rechargeable or replaceable due to the applications of these networks. One of the successful methods for saving energy in these networks is clustering. It has caused that cluster-based routing algorithms are successful routing algorithm for these networks....
متن کاملDistributed Key Management in Wireless Mesh Networks based on Verifiable Secret Sharing
Wireless mesh networks (WMNs) are wireless access networks based on IP technologies, which combine the advantages of WLANs and ad hoc networks and have thus become broadband access networks with high capacity, high speed and wide coverage. Due to the multi-hop characteristics of WMNs, security has become a critical issue in WMNs and a simple and effective distributed key management is essential...
متن کاملA Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks
Roaming in wireless mesh networks (WMNs) requires that mobile nodes complete access authentication fast while protecting the identities of mobile nodes. In this paper, after analyzing some current authentication protocols for roaming in wireless mesh networks, we propose a new protocol based on multi-signature and three-party key agreement with a zone-based hierarchical network topology and pro...
متن کاملA multi-hop PSO based localization algorithm for wireless sensor networks
A sensor network consists of a large number of sensor nodes that are distributed in a large geographic environment to collect data. Localization is one of the key issues in wireless sensor network researches because it is important to determine the location of an event. On the other side, finding the location of a wireless sensor node by the Global Positioning System (GPS) is not appropriate du...
متن کامل