Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
The objective of self-healing key distribution is to enable group users to recover session keys by themselves, without requesting additional transmissions from the group manager (GM), even when they miss some broadcast messages. One major benefit of the self-healing key distribution mechanism is the...
| Main Authors: | , , , , |
|---|---|
| Format: | Journal Article |
| Published: |
Oxford University Press
2011
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/27948 |
| _version_ | 1848752404673069056 |
|---|---|
| author | Tian, Biming Han, Song Parvin, Sazia Hu, J. Das, S. |
| author_facet | Tian, Biming Han, Song Parvin, Sazia Hu, J. Das, S. |
| author_sort | Tian, Biming |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | The objective of self-healing key distribution is to enable group users to recover session keys by themselves, without requesting additional transmissions from the group manager (GM), even when they miss some broadcast messages. One major benefit of the self-healing key distribution mechanism is the reduction of energy consumption due to the elimination of such additional transmission. Also in some applications, e.g., uni-directional broadcast channel from the GM, the self-healing key distribution mechanism seems to be the ideal solution. Desired features of self-healing key distribution schemes include energy awareness, short broadcast message, efficient users addition, revocation and so on. A primary challenge is managing the trade-off between providing an acceptable level of security and conserving scarce resources in particular energy which is critical for wireless network operations. Over a decade, a great number of self-healing key distribution schemes have been proposed for establishing a group key amongst a dynamic group of users over an unreliable, or lossy, network. In this paper a comprehensive survey is conducted on the state-of-the-art in the field of self-healing key distribution.First, we clarify the security requirements of self-healing key distribution scheme for their special application environment. Then, we present a classification of self-healing key distribution schemes according to different cryptographic primitives, and give an insight to their features and goals. Furthermore, we consider several problems, namely authentication on broadcast messages, sponsorization and mutual-healing, related to the robustness of self-healing key distribution schemes. At last, we delineate their similarities and differences and outline several future research directions. |
| first_indexed | 2025-11-14T08:08:05Z |
| format | Journal Article |
| id | curtin-20.500.11937-27948 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T08:08:05Z |
| publishDate | 2011 |
| publisher | Oxford University Press |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-279482017-09-13T15:55:52Z Self-Healing Key Distribution Schemes for Wireless Networks: A Survey Tian, Biming Han, Song Parvin, Sazia Hu, J. Das, S. subset difference rekeying wireless networks self-healing key distribution one way hash function wireless security The objective of self-healing key distribution is to enable group users to recover session keys by themselves, without requesting additional transmissions from the group manager (GM), even when they miss some broadcast messages. One major benefit of the self-healing key distribution mechanism is the reduction of energy consumption due to the elimination of such additional transmission. Also in some applications, e.g., uni-directional broadcast channel from the GM, the self-healing key distribution mechanism seems to be the ideal solution. Desired features of self-healing key distribution schemes include energy awareness, short broadcast message, efficient users addition, revocation and so on. A primary challenge is managing the trade-off between providing an acceptable level of security and conserving scarce resources in particular energy which is critical for wireless network operations. Over a decade, a great number of self-healing key distribution schemes have been proposed for establishing a group key amongst a dynamic group of users over an unreliable, or lossy, network. In this paper a comprehensive survey is conducted on the state-of-the-art in the field of self-healing key distribution.First, we clarify the security requirements of self-healing key distribution scheme for their special application environment. Then, we present a classification of self-healing key distribution schemes according to different cryptographic primitives, and give an insight to their features and goals. Furthermore, we consider several problems, namely authentication on broadcast messages, sponsorization and mutual-healing, related to the robustness of self-healing key distribution schemes. At last, we delineate their similarities and differences and outline several future research directions. 2011 Journal Article http://hdl.handle.net/20.500.11937/27948 10.1093/comjnl/bxr022 Oxford University Press restricted |
| spellingShingle | subset difference rekeying wireless networks self-healing key distribution one way hash function wireless security Tian, Biming Han, Song Parvin, Sazia Hu, J. Das, S. Self-Healing Key Distribution Schemes for Wireless Networks: A Survey |
| title | Self-Healing Key Distribution Schemes for Wireless Networks: A Survey |
| title_full | Self-Healing Key Distribution Schemes for Wireless Networks: A Survey |
| title_fullStr | Self-Healing Key Distribution Schemes for Wireless Networks: A Survey |
| title_full_unstemmed | Self-Healing Key Distribution Schemes for Wireless Networks: A Survey |
| title_short | Self-Healing Key Distribution Schemes for Wireless Networks: A Survey |
| title_sort | self-healing key distribution schemes for wireless networks: a survey |
| topic | subset difference rekeying wireless networks self-healing key distribution one way hash function wireless security |
| url | http://hdl.handle.net/20.500.11937/27948 |