Open Access Open Access  Restricted Access Subscription or Fee Access

Secured Autonomous Key Management with Bai’s Secret Sharing Scheme

N.M. SaravanaKumar, Dr. T. Purusothaman

Abstract


Network security and cryptography are exceedingly more important in wireless networks and the study of confidentiality and authenticity are becoming very essential in the current scenario. In order to satisfy these requirements, Secret sharing scheme is exploited during communication. Secret sharing scheme is a way of distributing a secret between a set of participants in a communication process by providing each participant a share in such a way that only the group of participants is allowed to reconstruct the secret from a pooling of their shares. Providing secure multicast communication concern in the process of distributing cryptographic keys to the members in order that only the members of the group can take part in group communications. In order to establish a secured and protected group communication, a proper secret sharing scheme should be utilized. In addition, the nodes in a wireless network join and leave later during the process of communication. As a result, it is essential that the secret sharing scheme in wireless network to be dynamic. In this paper, Bai’s Secret Sharing Scheme is incorporated into Autonomous Key Management (AKM) for enhancing the security in wireless networks. This Secured AKM with Bai’s secret sharing scheme provides better security with low computation complexity and very low communication cost.


Keywords


Wireless Network, Autonomous Key Management (AKM), Secret Sharing Scheme, Bai’s Secret Sharing Scheme

Full Text:

PDF

References


Zhao Yu Chi andJ.W. Atwood, “A Scalable Secure Multicast System”, Canadian Conference on Electrical and Computer Engineering (CCECE), Pp. 982–985,2007.

H. Kumar, D. Sarmaand A. Kar, “Security threats in wireless sensor networks”, IEEE Aerospace and Electronic Systems Magazine, Vol. 23, No. 6, Pp. 39–45, 2008.

Yan Sun,W. Trappe and K.J.R.Liu, “A scalable multicast key management scheme for heterogeneous wireless networks”, IEEE/ACM Transactions on Networking, Vol. 12, No. 4, Pp. 653–666, 2004.

W. Fumy and P. Landrock, “Principles of key management”, IEEE Journal on Selected Areas in Communications, Pp. 785–793, 1993.

Alfred J.Menezes, Paul C. van Oorschot and Scott A. Vanstone,“Handbook of Applied Cryptography”, CRC Press, Pp.544, 1996.

Stephen E. Deering,“Multicast Routing in Internetworks and Extended LANs”, Proceedings of ACM SIGCOMM ’88, 1988.

Huaxiong Wang andD.S. Wong, “On Secret Reconstruction in Secret Sharing Schemes”, IEEE Transactions on Information Theory, Vol. 54, No. 1, Pp. 473–480, 2008.

W.A. Jackson and K.M. Martin, “Geometric secret sharing schemes and their duals. Designs, Codes and Cryptography”, Vol. 4, No. 1, Pp. 83–95, 1994

M. Franklin and M. Yung,“Communication complexity of secure computation”, 1992.

K. Srinathan, N. TharaniRajan and C. PanduRangan,“Nonperfectsecret sharing over general access structures”, In INDOCRYPT,Pp. 409–421, 2002.

C.-H.T. Yang, Yuan-Hui Huang andJhih-HaoSyue, “Reversible secret image sharing based on Shamir's scheme with discrete haar wavelet transform”, International Conference on Electrical and Control Engineering (ICECE), Pp. 1250–1253, 2011.

Li Bai, “A Strong Ramp Secret Sharing Scheme Using Matrix Projection”, Proceedings of International Symposium on a World of Wireless, Mobile and MultimediaNetworks (WoWMoM'06), Pp. 656, 2006.

L. Harn and H.Y. Lin, “An Authenticated Key Agreement Protocol Without Using One-way Functions”, Proc. of 8th National Conf. on Information Security, Kaoshiung Taiwan, Pp.155–160, 1998.

Qianqian Zhang,Zhihui Li andXiong Li, “A verifiable secret sharing scheme without dealer in vector space”, Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Vol. 4, Pp. 2222–2225, 2011.

B. Zhu, F. Bao, R.H. Deng, M.S. Kankanhalli and G. Wang, “Efficient and robust key management for large mobile ad hoc networks,” Computer networks, Vol. 48, Pp. 657-682, 2005.

Chu-Hsing Lin and Chen-Yu Lee, “Modified Autonomous Key Management Scheme with Reduced Communication/Computation Costs in MANET”, International Conference on Complex, Intelligent and Software Intensive Systems, Pp. 818-821, 2010.

A. Shamir,“How to share a secret”, Communications of the ACM, Vol. 22, No. 11, Pp. 612–613, 1979.

T. Migler, K.E. Morrison and M. Ogle,“Weight and rank of matrices over finite fields”, 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.