Pruned nodes in ternary key tree during batch rekeying in group key agreement for cognitive radio ad hoc networks

Cognitive radio networks need stringent and secure group communication as nodes dynamically access the free portions of radio frequency spectrum to solve the spectrum scarcity in wireless networks. The cognitive radio ad hoc networks can use group key agreement to achieve security in group communication and tree topology to organize the group members in order to reduce the complexity of group operations. This paper proposes a ternary key tree model for tree-based group key agreement in cognitive radio ad hoc networks, and it considers batch rekeying scheme. The range of ids for member, non-member and pruned nodes in the ternary key tree are analysed in this paper. This paper proposes the analysis of two types of leave operations in the key tree, and the concept of subtree structure is used to analyse the total number of internal nodes that are pruned during leave operations in the key tree through mathematical expressions. This pruned nodes analysis can be used in finding the total number of renewed nodes in the key tree during rekeying process to measure the communication complexity of tree-based group key agreement protocol. Copyright © 2015 John Wiley & Sons, Ltd.

[1]  Tongtong Li,et al.  Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard , 2014, IEEE Transactions on Information Forensics and Security.

[2]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[3]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[4]  Minming Li,et al.  Approximately optimal trees for group key management with batch updates , 2009, Theor. Comput. Sci..

[5]  K. P. Subbalakshmi,et al.  Digital Signatures for Centralized DSA Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[6]  C. Mala,et al.  Ternary Tree Based Group Key Agreement for Cognitive Radio MANETs , 2014 .

[7]  Tang Hong,et al.  A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[8]  Fangwei Li,et al.  A method to defense against cooperative SSDF attacks in Cognitive Radio Networks , 2013, 2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013).

[9]  Mohamed Othman,et al.  Lightweight decentralized multicast-unicast key management method in wireless IPv6 networks , 2014, J. Netw. Comput. Appl..

[10]  Antonio F. Gómez-Skarmeta,et al.  Distributed Capability-based Access Control for the Internet of Things , 2013, J. Internet Serv. Inf. Secur..

[11]  Ian F. Akyildiz,et al.  CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.

[12]  Liming Xie,et al.  A QoS routing algorithm for group communications in Cognitive Radio ad hoc networks , 2011, 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC).

[13]  Younghan Kim,et al.  Flow Mobility Management in PMIPv6-based DMM (Distributed Mobility Management) Networks , 2014, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[14]  Elisa Bertino,et al.  Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.

[15]  Sachin Tripathi,et al.  Design of efficient ternary-tree based group key agreement protocol for dynamic groups , 2009, 2009 First International Communication Systems and Networks and Workshops.

[16]  Abdul Ghafoor,et al.  Grouping technique for cooperative spectrum sensing in cognitive radios , 2009, 2009 Second International Workshop on Cognitive Radio and Advanced Spectrum Management.

[17]  Clifford Stein,et al.  Introduction to Algorithms, 2nd edition. , 2001 .

[18]  Hua-Yi Lin,et al.  Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[19]  Y. Thomas Hou,et al.  Cognitive radio communications and networks: principles and practice , 2012 .

[20]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[21]  K. J. Ray Liu,et al.  Index of Terms , 2016 .

[22]  Feipei Lai,et al.  Secure and efficient group key management with shared key derivation , 2009, Comput. Stand. Interfaces.

[23]  Gene Tsudik,et al.  Tree-based group key agreement , 2004, TSEC.

[24]  Junbeom Hur,et al.  Scalable and efficient approach for secure group communication using proxy cryptography , 2012, Wirel. Networks.

[25]  Seung-Woo Seo,et al.  Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users , 2014, IEEE Transactions on Mobile Computing.

[26]  Jun Zhang,et al.  Performance Analysis of Batch Rekey Algorithm for Secure Group Communications , 2004, PDCAT.

[27]  Baocang Wang,et al.  Group key agreement for secure group communication in dynamic peer systems , 2012, J. Parallel Distributed Comput..

[28]  Mohsen Guizani,et al.  Survey of Security Issues in Cognitive Radio Networks , 2011 .

[29]  Muhammad Sher,et al.  ECC and Symmetric based Hybrid Authenticated Key Agreement Implementation and Analysis for Body Sensor Networks , 2015 .

[30]  C. N. Mathur,et al.  Security Issues in Cognitive Radio Networks , 2007 .

[31]  Tapas Pandit,et al.  eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (Extended Version) , 2014, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[32]  Min Wu,et al.  Dynamic join-exit amortization and scheduling for time-efficient group key agreement , 2004, IEEE INFOCOM 2004.

[33]  Olga Leon,et al.  A new cross-layer attack to TCP in cognitive radio networks , 2009, 2009 Second International Workshop on Cross Layer Design.

[34]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[35]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[36]  C. Mala,et al.  Tree Based Group Key Agreement – A Survey for Cognitive Radio Mobile Ad Hoc Networks , 2014 .

[37]  Xiaohua Jia,et al.  Causal ordering group communication for cognitive radio ad hoc networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[38]  Jiashu Zhang,et al.  Secure group key agreement protocol based on chaotic Hash , 2010, Inf. Sci..

[39]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[40]  Ian F. Akyildiz,et al.  Cognitive Wireless Mesh Networks with Dynamic Spectrum Access , 2008, IEEE Journal on Selected Areas in Communications.

[41]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[42]  Shahaboddin Shamshirband,et al.  Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges , 2015, J. Netw. Comput. Appl..

[43]  Il-Min Kim,et al.  Secure communications with untrusted secondary users in cognitive radio networks , 2014, 2012 IEEE Global Communications Conference (GLOBECOM).

[44]  Xiaozhuo Gu,et al.  Dynamic contributory key management based on Weighted-Join-Exit-Tree , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[45]  Song Han,et al.  Cognitive radio network security: A survey , 2012, J. Netw. Comput. Appl..

[46]  David K. Y. Yau,et al.  Distributed collaborative key agreement and authentication protocols for dynamic peer groups , 2006, TNET.