Paper 2012/295

Broadcast-enhanced key predistribution schemes

Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, and Douglas R. Stinson

Abstract

We present a formalisation of a category of schemes which we call Broadcast-enhanced Key Predistribution Schemes (BEKPSs). These schemes are suitable for networks with access to a trusted base station and an authenticated broadcast channel. We demonstrate that the access to these extra resources allows for the creation of BEKPSs with advantages over key predistribution schemes such as flexibility and more efficient revocation. There are many possible ways to implement BEKPSs, and we propose a framework for describing and analysing them. In their paper `From key predistribution to key redistribution', Cichoń, Go{\l}ȩbiewski and Kuty{\l}owski propose a scheme for `redistributing' keys to a wireless sensor network using a broadcast channel after an initial key predistribution. We classify this as a BEKPS and analyse it in that context. We provide simpler proofs of some results from their paper, give a precise analysis of the resilience of their scheme, and discuss possible modifications. We then study two scenarios where BEKPSs may be particularly desirable and propose a suitable family of BEKPSs for each case. We demonstrate that they are practical and efficient to implement, and our analysis shows their effectiveness in achieving suitable trade-offs between the conflicting priorities in resource-constrained networks.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Minor revision. ACM Transactions on Sensor Networks (to appear)
Contact author(s)
michelle louise kendall @ gmail com
History
2014-03-28: last of 2 revisions
2012-06-03: received
See all versions
Short URL
https://ia.cr/2012/295
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/295,
      author = {Michelle Kendall and Keith M.  Martin and Siaw-Lynn Ng and Maura B.  Paterson and Douglas R.  Stinson},
      title = {Broadcast-enhanced key predistribution schemes},
      howpublished = {Cryptology {ePrint} Archive, Paper 2012/295},
      year = {2012},
      url = {https://eprint.iacr.org/2012/295}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.