G-OPEP: An On-Demand Group Key Agreement Protocol for MANETs

Securing a multicast architecture is a basic procedure in order to avoid attacks and guarantee the communication integrity and confidentiality. This becomes more vital when dealing with ad hoc network. The lack of physical and administrative infrastructure and the dynamic topology, make the ad-hoc network more arduous to be secured. In this paper, we propose a key management protocol to secure ad-hoc network. Our proposal relies on the routing mechanism.

[1]  Chak-Kuen Wong,et al.  A conference key distribution system , 1982, IEEE Trans. Inf. Theory.

[2]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[3]  Gene Tsudik,et al.  CLIQUES: a new approach to group key agreement , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[4]  Robin Kravets,et al.  Key management for heterogeneous ad hoc wireless networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[5]  Khaled Masmoudi,et al.  An on-demand key establishment protocol for MANETs , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[6]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[7]  Shouhuai Xu,et al.  Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[8]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[9]  Gene Tsudik,et al.  Authenticated group key agreement and friends , 1998, CCS '98.

[10]  Owen Rees,et al.  Efficient and timely mutual authentication , 1987, OPSR.

[11]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[12]  J. van Loon Network , 2006 .

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[15]  Charles E. Perkins,et al.  Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.

[16]  Uta Wille,et al.  Communication complexity of group key distribution , 1998, CCS '98.

[17]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[18]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[19]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[20]  Eric Ricardo Anton Group Key Establishment in Wireless Ad Hoc Networks , 2002 .

[21]  Zongkai Yang,et al.  Simulation Comparison of Four Wireless Ad hoc Routing Protocols , 2004 .

[22]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[23]  N. Asokan,et al.  Key agreement in ad hoc networks , 2000, Comput. Commun..

[24]  Christian Gehrmann,et al.  Manual authentication for wireless devices , 2004 .