Privacy-preserving ID-based key agreement protocols for cluster-based MANETs

Security support is a significant factor in ad hoc networks. Especially in dynamic topologies, considering clusters, key distribution, key agreement and key management are essential for providing a secure system. It is also necessary to protect the identities of individual nodes in wireless environments to avoid personal privacy concerns. However, many of the existing key agreement schemes for Mobile Ad Hoc Networks MANETs do not consider these security issues concurrently. This paper proposes privacy-preserving ID-based cluster key distribution and key agreement schemes for cluster-based MANETs and proves them in ID-mBJM model. To the best of our knowledge, our proposal is the first in which the anonymity property is combined with cluster-based MANETs. These schemes are secure against a wide variety of attacks and are suitable for privacy-preserving MANETs. Therefore, these schemes can be applied in many different kinds of cluster-based MANETs to protect user's privacy.

[1]  Zhenfu Cao,et al.  An improved identity-based key agreement protocol and its security proof , 2009, Inf. Sci..

[2]  Michele Nogueira Lima,et al.  Identity-based key management in mobile ad hoc networks: techniques and applications , 2008, IEEE Wireless Communications.

[3]  Mingxing He,et al.  Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks , 2006, CANS.

[4]  Hung-Yu Chien Practical anonymous user authentication scheme with security proof , 2008, Comput. Secur..

[5]  Paulo S. L. M. Barreto,et al.  Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.

[6]  Yuguang Fang,et al.  An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[7]  Hugo Krawczyk,et al.  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.

[8]  Hung-Yu Chien ID-Based Key Agreement with Anonymity for Ad Hoc Networks , 2007, EUC.

[9]  Xingwen Zhao,et al.  Dynamic asymmetric group key agreement for ad hoc networks , 2011, Ad Hoc Networks.

[10]  Ratna Dutta,et al.  Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks , 2011, Ad Hoc Networks.

[11]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[12]  Maarit Hietalahti A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks , 2008, Electron. Notes Theor. Comput. Sci..

[13]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[14]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[15]  Driss Aboutajdine,et al.  An energy efficient clustering protocol for routing in Wireless Sensor Network , 2011, Int. J. Ad Hoc Ubiquitous Comput..

[16]  Hung-Yu Chien,et al.  Improved ID-based security framework for ad hoc network , 2008, Ad Hoc Networks.

[17]  Norihiko Yoshida,et al.  Context-aware cluster-based hierarchical protocol for Wireless Sensor Networks , 2009, Int. J. Ad Hoc Ubiquitous Comput..

[18]  Caroline J. Kudla,et al.  Special Signature Schemes and Key Agreement Protocols , 2006 .

[19]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[20]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[21]  Lung-Chung Li,et al.  Securing Cluster-Based Ad Hoc Networks with Distributed Authorities , 2010, IEEE Transactions on Wireless Communications.

[22]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[23]  Haiyun Luo,et al.  URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.

[24]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[25]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[26]  Ren-Junn Hwang,et al.  Privacy protection on Vehicular Ad hoc NETworks , 2011, Int. J. Ad Hoc Ubiquitous Comput..

[27]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[28]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[29]  Elisavet Konstantinou Cluster-based Group Key Agreement for Wireless Ad hoc Networks , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[30]  Yuguang Fang,et al.  Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.

[31]  Rajesh Krishnan,et al.  Optimization algorithms for large self-structuring networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[32]  Ali Miri,et al.  Efficient identity-based security schemes for ad hoc network routing protocols , 2004, Ad Hoc Networks.

[33]  Farouk Kamoun,et al.  Optimal clustering structures for hierarchical topological design of large computer networks , 1980, Networks.