Session Key Generation for a Group Call and Device for Security Control

The presence of wireless links makes mobile ad hoc networks more vulnerable than wire-line networks to various forms of attack. Multimedia group communication applications over such Ad hoc networks need a group key to encrypt group call traffic. This security requirement for group communications can be fulfilled by applying dynamic group key management architecture. In this paper, we propose the key agreement architecture that can be realized by encrypting RTP (Real-time Protocol) packets with call-based dynamic group key. We also propose the key control device (KCD) that legally listen to any group call. We solve these contradictory sounding goals: encrypting call traffic and monitoring call traffic. The key agreement part forces every group member to calculate the key tree by means of an iterative Diffie-Hellman group key exchange. In the proposed key management, the transaction manager (TM) is designed to report call information so KCD may compute the same group key for security control. In contrast to the called members, the calling user (that is, TM) generates a random number that is temporarily used as its one time session key doing duty for its original private key. This one time session key will stop the group key being re-used and prevent exploitation of group key weaknesses. Finally, we analyze the computational load (C_{load}) and message transmission load (MT_{load}) required for group key computation.

[1]  Yuan Ning Securing AD-HOC networks using IPSec , 2006 .

[2]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[3]  Luigi Atzori,et al.  IP Telephony over Mobile Ad Hoc Networks: Joint Routing and Playout Buffering , 2008, 2008 IEEE International Conference on Communications.

[4]  T.H. Tran,et al.  Proactive Multicast-Based IPSEC Discovery Protocol and Multicast Extension , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[5]  Mark Metcalf Project MESA: advanced mobile broadband communications for public safety applications , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[6]  M. Bereschinsky,et al.  Securing ad-hoc networks using IPsec , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[7]  Hung-Min Sun,et al.  An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks , 2007, 2007 12th IEEE Symposium on Computers and Communications.

[8]  Bobby Bhattacharjee,et al.  Scalable secure group communication over IP multicast , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[9]  T. Aurisch Using key trees for securing military multicast communication , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..

[10]  Apostolis K. Salkintzis Evolving public safety communication systems by integrating WLAN and TETRA networks , 2006, IEEE Communications Magazine.

[11]  Byrav Ramamurthy,et al.  CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[12]  T. Aurisch Optimization techniques for military multicast key management , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[13]  X. Liu An architecture of security control in sensor networks , 2005, Symposium, 2005 Wireless Telecommunications.

[14]  Jorma Ylinen,et al.  A Proposal to Improve IKEv2 negotiation , 2007, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007).

[15]  Gene Tsudik,et al.  Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.

[16]  Jim Burns,et al.  A Distributed Hierarchical Policy Management System for Security Control over Tactical Mobile Ad Hoc Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[17]  Brian Haberman,et al.  Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology , 2006, IEEE Communications Magazine.