ISSN 1816-353X (Print) Vol. 17, No. 6 (Dec. 2015) ISSN 1816-3548 (Online)
Total Page:16
File Type:pdf, Size:1020Kb
ISSN 1816-353X (Print) Vol. 17, No. 6 (Dec. 2015) ISSN 1816-3548 (Online) INTERNATIONAL JOURNAL OF NETWORK SECURITY Editor-in-Chief Gregorio Martinez Prof. Min-Shiang Hwang University of Murcia (UMU) (Spain) Department of Computer Science & Information Engineering, Asia Sabah M.A. Mohammed University, Taiwan Department of Computer Science, Lakehead University (Canada) Co-Editor-in-Chief: Lakshmi Narasimhan Prof. Chin-Chen Chang (IEEE Fellow) School of Electrical Engineering and Computer Science, University of Department of Information Engineering and Computer Science, Newcastle (Australia) Feng Chia University, Taiwan Khaled E. A. Negm Publishing Editors Etisalat University College (United Arab Emirates) Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang Joon S. Park School of Information Studies, Syracuse University (USA) Board of Editors Antonio Pescapè University of Napoli "Federico II" (Italy) Ajith Abraham Zuhua Shao School of Computer Science and Engineering, Chung-Ang University Department of Computer and Electronic Engineering, Zhejiang University (Korea) of Science and Technology (China) Wael Adi Mukesh Singhal Institute for Computer and Communication Network Engineering, Technical Department of Computer Science, University of Kentucky (USA) University of Braunschweig (Germany) Nicolas Sklavos Sheikh Iqbal Ahamed Informatics & MM Department, Technological Educational Institute of Department of Math., Stat. and Computer Sc. Marquette University, Patras, Hellas (Greece) Milwaukee (USA) Tony Thomas Vijay Atluri School of Computer Engineering, Nanyang Technological University MSIS Department Research Director, CIMIC Rutgers University (USA) (Singapore) Mauro Barni Mohsen Toorani Dipartimento di Ingegneria dell’Informazione, Università di Siena (Italy) Department of Informatics, University of Bergen (Norway) Andrew Blyth Shuozhong Wang Information Security Research Group, School of Computing, University of School of Communication and Information Engineering, Shanghai Glamorgan (UK) University (China) Soon Ae Chun Zhi-Hui Wang College of Staten Island, City University of New York, Staten Island, NY School of Software, Dalian University of Technology (China) (USA) Chuan-Kun Wu Stefanos Gritzalis Chinese Academy of Sciences (P.R. China) and Department of Computer University of the Aegean (Greece) Science, National Australian University (Australia) Lakhmi Jain Chou-Chen Yang School of Electrical and Information Engineering, Department of Management of Information Systems, National Chung Hsing University of South Australia (Australia) University (Taiwan) James B D Joshi Sherali Zeadally Dept. of Information Science and Telecommunications, University of Department of Computer Science and Information Technology, University Pittsburgh (USA) of the District of Columbia, USA Ç etin Kaya Koç Jianping Zeng School of EECS, Oregon State University (USA) School of Computer Science, Fudan University (China) Shahram Latifi Justin Zhan Department of Electrical and Computer Engineering, University of Nevada, School of Information Technology & Engineering, University of Ottawa Las Vegas (USA) (Canada) Cheng-Chi Lee Mingwu Zhang Department of Library and Information Science, Fu Jen Catholic University College of Information, South China Agric University (China) (Taiwan) Yan Zhang Chun-Ta Li Wireless Communications Laboratory, NICT (Singapore) Department of Information Management, Tainan University of Technology (Taiwan) PUBLISHING OFFICE Iuon-Chang Lin Min-Shiang Hwang Department of Management of Information Systems, National Chung Hsing Department of Computer Science & Information Engineering, Asia University (Taiwan) University, Taichung 41354, Taiwan, R.O.C. John C.S. Lui Email: [email protected] Department of Computer Science & Engineering, Chinese University of Hong Kong (Hong Kong) International Journal of Network Security is published both in traditional Kia Makki paper form (ISSN 1816-353X) and in Internet (ISSN 1816-3548) at Telecommunications and Information Technology Institute, College of http://ijns.jalaxy.com.tw Engineering, Florida International University (USA) PUBLISHER: Candy C. H. Lin © Jalaxy Technology Co., Ltd., Taiwan 2005 23-75, P.O. Box, Taichung, Taiwan 40199, R.O.C. International Journal of Network Security Vol. 17, No. 6 (Dec. 1, 2015) 1. An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks Doraipandian Manivannan, P. Neelamegam 651-660 2. Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data Xingbing Fu, Shengke Zeng, and Fagen Li 661-671 3. Anomaly Detection Using an MMPP-based GLRT Chris Scheper and William J. J. Roberts 672-677 4. Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round Qingfeng Cheng and Chunming Tang 678-682 5. Towards Generating Real-life Datasets for Network Intrusion Detection Monowar H. Bhuyan, Dhruba K. Bhattacharyya, and Jugal K. Kalita 683-701 6. An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Chin-Chen Chang, Jen-Ho Yang and Yu-Ching Wu 702-707 7. On the Privacy of “User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking” Yalin Chen, Jue-Sam Chou 708-711 8. A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks Tung-Huang Feng, Neng-Yih Shih, and Min-Shiang Hwang 712-721 9. Hiding of Confidential Data in Spatial Domain Images using Image Interpolation S. Maria Celestin Vigila, K. Muneeswaran 722-727 10. Cryptanalysis of Two Efficient Password-based Authentication Schemes Using Smart Cards Ying Wang and Xinguang Peng 728-735 11. Provable Secure Multi-Proxy Signature Scheme without Bilinear Maps Namita Tiwari and Sahadeo Padhye 736-742 12. Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing Xu Ma, Jin Li, and Fangguo Zhang 743-753 13. IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach Ghazaleh Javadzadeh, Reza Azmi 754-770 14. A Dynamic Threshold Decryption Scheme Using Bilinear Pairings Brian King 771-778 15. Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme Yang Zhao, Feng Yue, Songyang Wu, Hu Xiong, and Zhiguang Qin 779-786 16. An Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings Jie Ling, Guangqiang Zhao 787-794 17. On the Security of Three Public Auditing Schemes in Cloud Computing Yang Ming, Yumin Wang 795-802 18. Reviewers (Volume 17, 2015) 803-804 International Journal of Network Security, Vol.17, No.6, PP.651-660, Nov. 2015 651 An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks Manivannan Doraipandian1, P. Neelamegam2 (Corresponding author: Manivannan Doraipandian) School of Computing, SASTRA University1 Tirumalaisamudram, Thanjavur, Tamil Nadu 613401, India School of Electrical and Electronics Engineering, SASTRA University2 (Email: [email protected]) (Received Apr. 16, 2013; revised and accepted Aug. 15 & Nov. 26, 2013) Abstract Though many cryptographic algorithms are available, but the strength of the algorithm purely depends on the key Wireless Sensor Network is a collection of autonomous used. For eg. If AES is incorporated, whoever involved sensor nodes placed spatially. Unlike wired networks the in building up the security mechanisms knows about the sensor nodes here are subject to resource constraints such AES. So the importance will be on key and also the size as memory, power and computation constraints. Key of the key. If 128 bit key is used, a possible set of key will management and Security are the area of research in be in 2128. So to establish a secure communication key WSN. To ensure high level security encryption is neces- management plays a vital role. Key management includes sary. The strength of any encryption algorithm depends key generation, distribution and storage of keys. The at- upon the key used. So Key Management plays a signifi- tackers usually made an attack on the key management cant role. The proposed KMS using LLT matrix achieves level rather than cryptographic algorithm level. Since the both Node-to-Node communication and Group communi- sensor node is resource constrained designing a key man- cation. The main objective of the scheme is to strengthen agement scheme for WSN is challenging issue. In recent the data transferring security mechanisms and also to en- years, many key management schemes are proposed. Key sure efficient key generation and management along with management schemes are broadly classified into three cat- authentication. The main feature of this proposed sys- egories: key pre-distribution, arbitrated key mechanisms tem is 100% Local-connectivity; efficient node revocation and self-enforcing mechanisms. Arbitrated keying mech- methodology, perfect resilience; three-level authentication anisms depend upon trusted third party agent. Of that cum key generation and the most importantly reduced the if the node gets compromised all information about the storage. The scheme and its detailed performance analy- network will get revealed. Self-enforcing mechanism is a sis are discussed in this paper. public key cryptography method. Since sensor nodes are Keywords: Cholesky decomposition, key connectivity, re- resource constraining this method is not preferable. silience, WSN Almost all key management schemes [1, 2, 3, 6, 7, 10, 16] are based on key pre-distribution method in which keys are loaded into sensor nodes before deployment.