Efficient Clustering for Multicast Key Distribution in MANETs

Securing multicast communications in ad hoc networks must consider several challenging factors such as high nodes mobility, limited bandwidth and constrained energy. Moreover, the establishment of a key management protocol within ad hoc environments meets the “1 affects n” problem, which is more critical in such type of networks, due to the high dynamicity of groups. In this paper, we present an efficient clustering scheme for multicast key distribution in Mobile ad hoc networks. This scheme divides the multicast group into clusters, according to the localization of the group members and their mobility. Simulations indicate a valuable reduction in the average latency of keys distribution and a promising reduction in energy consumption. Analysis also shows that our scheme is scalable.

[1]  Olivier Festor,et al.  An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks , 2004, NETWORKING.

[2]  Charles E. Perkins,et al.  Multicast Ad hoc On-Demand Distance Vector (MAODV) Routing , 2000 .

[3]  Yacine Challal,et al.  AKMP: an adaptive key management protocol for secure multicast , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.

[4]  Ashok Samal,et al.  Scalable secure one-to-many group communication using dual encryption , 2000, Comput. Commun..

[5]  K. J. Ray Liu,et al.  A scalable multicast key management scheme for heterogeneous wireless networks , 2004, IEEE/ACM Transactions on Networking.

[6]  Yacine Challal,et al.  SAKM: a scalable and adaptive key management approach for multicast communications , 2004, CCRV.

[7]  Abdelkader Lahmadi,et al.  Diffusion multicast sécurisée dans un environnement Ad-Hoc (1 vers n séquentiel) , 2004 .

[8]  Anthony Ephremides,et al.  On the construction of energy-efficient broadcast and multicast trees in wireless networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[9]  Tom E. Bishop,et al.  Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[10]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[11]  J. Sadowsky,et al.  On the correlation and scattering functions of the WSSUS channel for mobile communications , 1998 .

[12]  Anthony Ephremides,et al.  Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks , 2001, Mob. Networks Appl..

[13]  Radha Poovendran,et al.  Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[14]  A. Ephremides,et al.  Algorithms for energy-efficient multicasting in ad hoc wireless networks , 1999, MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341).

[15]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[16]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[17]  B. C. Jones,et al.  HIPERLAN channel assignment strategies , 1997 .