Provably Secure Receiver-Unrestricted Group Key Management Scheme for Mobile Ad Hoc Networks

Mobile ad hoc networks (MANETs) are self-configuring networks of wireless nodes, i.e., mobile devices. Since communications in MANETs occur via wireless channels, it is of significance to secure communications among wireless and mobile nodes. Group key management, as a widely used method for securing group communications, has potentially been used in MANETs for years. Most recently, a secure receiver-unrestricted group key management scheme for MANETs has been proposed, which is used to establish a secure channel among a group of wireless nodes without a trusted dealer, which has some advantages such as eliminating the certificate management problem and receiver restriction. However, a formal security analysis of this scheme is still lacking. Therefore, in this paper, we propose the complete security proof to demonstrate that the scheme satisfies the essential security properties including authentication, message confidentiality, known-key security and dynamic secrecy. We also give a brief discussion about the efficiency of the scheme.

[1]  R. Srividya,et al.  Light weight hash function using secured key distribution technique for MANET , 2022, International Journal of Information Technology.

[2]  L. Zhang,et al.  A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks , 2022, 2022 IEEE Wireless Communications and Networking Conference (WCNC).

[3]  T. Gadekallu,et al.  Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh Networks , 2022, Sensors.

[4]  P. Gajewski,et al.  Performance Analysis of Public Safety Cognitive Radio MANET for Diversified Traffic , 2022, Sensors.

[5]  V. Janani,et al.  An Efficient Distributed Secured Broadcast Stateless Group Key Management Scheme for Mobile Ad Hoc Networks , 2022, 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI).

[6]  Lei Zhang,et al.  Key Management Scheme for Secure Channel Establishment in Fog Computing , 2021, IEEE Transactions on Cloud Computing.

[7]  Kim-Kwang Raymond Choo,et al.  Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems , 2021, IEEE Internet of Things Journal.

[8]  Dongwen Zhang,et al.  Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City , 2020, IEEE Transactions on Industrial Informatics.

[9]  Jun Liang,et al.  Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey , 2020, Wirel. Commun. Mob. Comput..

[10]  Jianfeng Ma,et al.  Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network , 2019, IEEE Transactions on Vehicular Technology.

[11]  K. V. N. Sunitha,et al.  Multicast Symmetric Secret Key Management Scheme in Mobile Ad-hoc Networks , 2019, Learning and Analytics in Intelligent Systems.

[12]  Lein Harn,et al.  Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks , 2019, IEEE Access.

[13]  Emin Anarim,et al.  A secure and efficient group key agreement approach for mobile ad hoc networks , 2017, Ad Hoc Networks.

[14]  B. Parvathavarthini,et al.  An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management , 2017, Wirel. Pers. Commun..

[15]  Mainak Sen,et al.  Attacks and mitigation techniques on mobile ad hoc network — A survey , 2017, 2017 International Conference on Trends in Electronics and Informatics (ICEI).

[16]  Mohammed Gharib,et al.  Fully distributed ECC-based key management for mobile ad hoc networks , 2017, Comput. Networks.

[17]  Josep Domingo-Ferrer,et al.  Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts , 2016, IEEE Transactions on Computers.

[18]  Josep Domingo-Ferrer,et al.  Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Josep Domingo-Ferrer,et al.  Bridging Broadcast Encryption and Group Key Agreement , 2011, ASIACRYPT.

[20]  Yi Mu,et al.  Asymmetric Group Key Agreement , 2009, EUROCRYPT.

[21]  Alfredo De Santis,et al.  New constructions for provably-secure time-bound hierarchical key assignment schemes , 2007, SACMAT '07.

[22]  Farooque Azam,et al.  A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network , 2021, IEEE Access.

[23]  Shaheena Khatoon,et al.  A Dynamic ID Based Authenticated Group Key Agreement Protocol from Pairing , 2019, Int. J. Netw. Secur..