Transmission-efficient group-key generation in large dynamic MANET environments

Cryptographic key-management in a large dynamic environment such as mobile ad hoc network is a challenging task due to the limited availability of communication resources in wireless domain. This paper describes a novel key-management system using cluster-based group multicasting technique. The method employs Identity-based threshold-cryptographic group-key share distribution among participating nodes to form a secure group. There exist several clusters in each group to generate combined group key share using aggregate signcryption. The clusters inside same group collaborate with each other to generate a combined group-secret-share at cluster level and then contact with other clusters for mutual exchange of the combined group-secret-share to produce the final group key. This approach reduces the number of required encrypted transmitted messages containing group key shares. The scheme is highly applicable to other distributed dynamic environments with high security demand.

[1]  Bharat K. Bhargava,et al.  Key distribution and update for secure inter-group multicast communication , 2005, SASN '05.

[2]  Dharma P. Agrawal,et al.  Distributed key management for dynamic groups in MANETs , 2008, Pervasive Mob. Comput..

[3]  C. Pandu Rangan,et al.  Identity Based Aggregate Signcryption Schemes , 2009, INDOCRYPT.

[4]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[7]  M. Eltoweissy,et al.  CKDS: an efficient combinatorial key distribution scheme for wireless ad-hoc networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[8]  S. Zhu,et al.  GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[9]  Ren-Junn Hwang,et al.  An efficient signcryption scheme with forward secrecy based on elliptic curve , 2005, Appl. Math. Comput..

[10]  Raja Datta,et al.  A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network , 2011 .

[11]  K C Shet,et al.  Cluster Based Group Key Management in Mobile Ad hoc Networks , 2009 .

[12]  Radha Poovendran,et al.  Power proximity based key management for secure multicast in ad hoc networks , 2007, Wirel. Networks.

[13]  Olivier Festor,et al.  Group Key Management in MANETs , 2008, Int. J. Netw. Secur..

[14]  H.T. Friis,et al.  A Note on a Simple Transmission Formula , 1946, Proceedings of the IRE.

[15]  Miao Yu,et al.  A scalable key management and clustering scheme for wireless ad hoc and sensor networks , 2008, Future Gener. Comput. Syst..

[16]  Mani Srivastava,et al.  Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..

[17]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[18]  Giovanni Di Crescenzo,et al.  Improved topology assumptions for threshold cryptography in mobile ad hoc networks , 2005, SASN '05.