Mobility-awareness in group key management protocols within MANETs

Several sensitive applications deployed within wireless networks require group communications. A high level of security is often required in such applications, like military or public security applications. The most suitable solution to ensure security in these services is the deployment of a group key management protocol, adapted to the characteristics ofManets, especially to mobility of nodes.In this paper, we present theOmct (Optimized Multicast Cluster Tree) algorithm for dynamic clustering of multicast group, that takes into account both nodes localization and mobility, and optimizes the energy and bandwidth consumptions. Then, we show how we integrateOmct within our group key management protocolBalade, in a sequential multi-source model. The integration ofBalade andOmct allows an efficient and fast key distribution process, validated through simulations, by applying various models of mobility (individual mobility and group mobility). The impact of the mobility model on the performance and the behaviour of the group key management protocolBalade coupled withOmct, is also evaluated.RésuméPlusieurs applications sensibles ciblées dans les réseaux ad hoc, requièrent des communications de groupe. Un niveau de sécurité élevé est souvent indispensable pour de telles applications, comme les applications de sécurité militaires ou publiques. La solution la plus appropriée pour assurer la sécurité de ces services est le déploiement d’un protocole de gestion de clé de groupe, qui doit être adapté aux caractéristiques desManets (Mobile Ad Hoc Networks), et notamment à la mobilité des noeuds.Dans cet article, nous présentons l’algorithmeOmct (Optimized Multicast Cluster Tree) de clusterisation dynamique du groupe multicast, tenant compte de la localisation et de la mobilité des noeuds, et optimisant la consommation de l’énergie et de la bande passante. Nous montrons commentOmct est intégré dans notre protocole de gestion de clésBalade, dans un cadre multi-sources séquentielles. Le couplage deBalade etOmct permet d’assurer une distribution de clés efficace et rapide, et est validé au travers de simulations, utilisant différents modèles de mobilité (mobilité individuelle et mobilité de groupe). L’impact du modèle de mobilité sur les performances et le comportement du couplageBalade etOmct, est aussi évalué

[1]  Charles E. Perkins,et al.  Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.

[2]  Juan-Carlos Cano,et al.  The impact of group mobility on the optimization of mobile ad hoc networks routing protocols , 2003 .

[3]  Yueh-Min Huang,et al.  Group keys and the multicast security in ad hoc networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[4]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[5]  Olivier Festor,et al.  An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks , 2004, NETWORKING.

[6]  Samuel T. Redwine,et al.  A logic for the exclusion basis system , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[7]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[8]  Guy Pujolle,et al.  Minimisation de la consommation d’Énergie dans les réseaux ad hoc , 2005, Ann. des Télécommunications.

[9]  Yacine Challal,et al.  A Taxonomy of Group Key Management Protocols: Issues and Solutions , 2007 .

[10]  M. Eltoweissy,et al.  CKDS: an efficient combinatorial key distribution scheme for wireless ad-hoc networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[11]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[12]  Radha Poovendran,et al.  Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[13]  Olivier Festor,et al.  Efficient Clustering for Multicast Key Distribution in MANETs , 2005, NETWORKING.

[14]  J. Sadowsky,et al.  On the correlation and scattering functions of the WSSUS channel for mobile communications , 1998 .

[15]  Olivier Festor,et al.  Balade : diffusion multicast sécurisée d'un flux multimédia multi-sources séquentielles dans un environnement ad hoc , 2005 .

[16]  S. Zhu,et al.  GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[17]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM 2001.

[18]  Mingyan Liu,et al.  Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[19]  Yacine Challal,et al.  Group Key Management Protocols: A Novel Taxonomy , 2008 .

[20]  Ashok Samal,et al.  Scalable secure one-to-many group communication using dual encryption , 2000, Comput. Commun..

[21]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.

[22]  Guevara Noubir,et al.  Secure multicast groups on ad hoc networks , 2003, SASN '03.