Parallel key management scheme for mobile ad hoc network based on traffic mining

One of the main challenges in the mobile ad hoc network is to ensure secure communication, because of its dynamic topology and lack of centralised control. In this study, the authors propose a parallel key management scheme which combines the cluster-based key management and the partially distributed key management approach. The network is partitioned into clusters, where the cluster head (CH) plays the role of certification authority. The initial public key of each member is assigned by CH based on its identity (ID). The keys are updated periodically based on the node's ID and its trust value. The secret key of the node is generated by n key serving nodes, elected based on the trust value. The communication between the nodes is carried out by using the session key generated mainly based on the frequent traffic pattern exists between the nodes. The frequent traffic pattern is identified by mining the past network traffic data by using the backtracking search algorithm. The proposed scheme provides a mechanism for key generation, distribution and revocation. This scheme satisfies all security requirements and ensures forward and backward secrecies. The performance of the proposed scheme is evaluated by simulation.

[1]  Pål Spilling,et al.  A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.

[2]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[3]  Faramarz Fekri,et al.  A multivariate key-establishment scheme for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[4]  Noureldien A. Noureldien,et al.  Survey of Mobile Ad hoc Networks Attacks and a New Classification Scheme , 2015 .

[5]  I-En Liao,et al.  A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[6]  Lung-Chung Li,et al.  Securing Cluster-Based Ad Hoc Networks with Distributed Authorities , 2010, IEEE Transactions on Wireless Communications.

[7]  Xing Zhang,et al.  EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[8]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[9]  A. Vincent Antony Kumar,et al.  A secure dominating set based routing and key management scheme in mobile ad hoc network , 2011 .

[10]  Sanjay Kumar Madria,et al.  A survey of dynamic key management schemes in sensor networks , 2010 .

[11]  Mohsen Guizani,et al.  An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network , 2009, IEEE Transactions on Vehicular Technology.

[12]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[13]  Jerzy Jaworski,et al.  Random key predistribution for wireless sensor networks using deployment knowledge , 2009, Computing.

[14]  Rahmat Budiarto,et al.  A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority , 2011 .

[15]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[16]  Mohsen Guizani,et al.  A framework for a distributed key management scheme in heterogeneous wireless sensor networks , 2008, IEEE Trans. Wirel. Commun..

[17]  Bharat K. Bhargava,et al.  Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks , 2007, Int. J. Distributed Sens. Networks.

[18]  Mohammed J. Zaki,et al.  GenMax: An Efficient Algorithm for Mining Maximal Frequent Itemsets , 2005, Data Mining and Knowledge Discovery.

[19]  Douglas R. Stinson,et al.  On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.

[20]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[21]  Johann van der Merwe,et al.  A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.

[22]  Chun-Shien Lu,et al.  Noninteractive Pairwise Key Establishment for Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.

[23]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[24]  Kefei Chen,et al.  A key management protocol with robust continuity for sensor networks , 2009, Comput. Stand. Interfaces.

[25]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[26]  Ross J. Anderson,et al.  Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[27]  Chun-Shien Lu,et al.  A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[28]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[29]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[30]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[31]  Adrian Perrig,et al.  SAKE: Software attestation for key establishment in sensor networks , 2008, Ad Hoc Networks.

[32]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[33]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[34]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[35]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[36]  Hsiao-Hwa Chen,et al.  Selecting key management schemes for WSN applications , 2012, Comput. Secur..

[37]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[38]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[39]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.

[40]  Mohamed F. Younis,et al.  Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.

[41]  Erl-Huei Lu,et al.  Secured key exchange protocol in wireless mobile ad hoc networks , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.

[42]  José María Sierra,et al.  A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.

[43]  Rodrigo Roman,et al.  A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks , 2008, CANS.