A hierarchical key management scheme for secure group communications in mobile ad hoc networks

A mobile ad hoc network (MANET) is a kind of wireless communication infrastructure that does not have base stations or routers. Each node acts as a router and is responsible for dynamically discovering other nodes it can directly communicate with. However, when a message without encryption is sent out through a general tunnel, it may be maliciously attacked. In this paper, we propose a hierarchical key management scheme (HKMS) for secure group communications in MANETs. For the sake of security, we encrypt a packet twice. Due to the frequent changes of the topology of a MANET, we also discuss group maintenance in this paper. Finally, we conducted the security and performance analysis to compare the proposed scheme with Tseng et al.'s [Tseng, Y.-M., Yang, C.-C., Liao, D.-R., 2007. A secure group communication protocol for ad hoc wireless networks. In: Advances in Wireless Ad Hoc and Sensor Networks and Mobile Computing. Book Series Signal and Communication Technology. Springer] and Steiner et al.'s [Steiner, M., Tsudik, G., Waidner, M., 1998. CLIQUES: a new approach to group key agreement. In: Proceedings of the 18th IEEE International Conference on Distributed Computing System. Amsterdam, Netherlands, pp. 380-387] schemes.

[1]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[2]  Steve F. Russell Wireless network security for users , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[3]  S.K. Dhurandher,et al.  Weight based adaptive clustering in wireless ad hoc networks , 2005, 2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005..

[4]  Yueh-Min Huang,et al.  Group keys and the multicast security in ad hoc networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[5]  Jelena Mirkovic,et al.  Attacking DDoS at the source , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[6]  Joseph P. Macker,et al.  Mobile ad hoc networking and the IETF , 1998, MOCO.

[7]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[8]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[9]  Yongdae Kim,et al.  Secure Group Communication Using Robust Contributory Key Agreement , 2001 .

[10]  Elena Pagani,et al.  An on-demand shared tree with hybrid state for multicast routing in ad hoc mobile wireless networks , 1999, Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing (CMC'99). Group Communications (IWGC). Internet '99 (IWI'99). Industrial Applications on Network Computing (INDAP). Multime.

[11]  Henry L. Owen,et al.  Wireless intrusion detection and response: a classic study using main-in-the-middle attack , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[12]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[13]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[14]  Josef Pieprzyk,et al.  Multiparty key agreement protocols , 2000 .

[15]  Halim Fathoni,et al.  DEPARTMENT OF COMPUTER SCIENCE AND INFORMATION ENGINEERING , 2008 .

[16]  Joseph P. Macker,et al.  Mobile ad hoc networking and the IETF , 2006, MOCO.

[17]  Anupam Joshi,et al.  Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[18]  Liu Jing Key Management and Access Control for Large Dynamic Multicast Groups , 2002 .

[19]  Prashant Sharma,et al.  Secure multicast model for ad-hoc military networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[20]  Chen-Khong Tham,et al.  A novel routing protocol using mobile agents and reactive route discovery for ad hoc wireless networks , 2002, Proceedings 10th IEEE International Conference on Networks (ICON 2002). Towards Network Superiority (Cat. No.02EX588).

[21]  Jing Liu,et al.  Key management and access control for large dynamic multicast group , 2002, Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002).

[22]  Jin-Hee Cho,et al.  Performance characteristics of region-based group key management in mobile ad hoc networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[23]  Gene Tsudik,et al.  CLIQUES: a new approach to group key agreement , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[24]  David P. Jablon Strong password-only authenticated key exchange , 1996, CCRV.

[25]  Panlong Yang,et al.  Security management in hierarchical ad hoc network , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).

[26]  Ruay-Shiung Chang,et al.  Weight-based clustering multicast routing protocol for mobile ad hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[27]  Chin-Chen Chang,et al.  An efficient session key generation protocol , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[28]  Dharma P. Agrawal,et al.  Level-based key establishment for multicast communication in mobile ad hoc networks , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).

[29]  Hassan Taheri,et al.  A light-weight contention-based clustering algorithm for wireless ad hoc networks , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[30]  Shueng-Han Gary Chan,et al.  Key management approaches to offer data confidentiality for secure multicast , 2003 .