A secure group communication approach for tactical network environments

Group communication protocols that utilize multicast or local broadcast transmissions are more efficient than point-to-point protocols when disseminating the same information to multiple recipients. This is particularly true for Situation Awareness information at the tactical edge, which is transmitted from each sender to all receivers. However, group communications protocols do not address requirements for strong security mechanisms. This paper describes a novel approach that has been developed to provide secure group communications specifically to support dismounted warfighters at the tactical edge. The protocol has been incorporated into the Agile Computing Middleware's Proactive Dissemination Service (DSPro) and supports a variety of requirements such as dynamic authorization and de-authorization of clients as well as disruption-tolerant group communications.

[1]  Cesare Stefanelli,et al.  Exploring value-of-information-based approaches to support effective communications in tactical networks , 2015, IEEE Communications Magazine.

[2]  Cesare Stefanelli,et al.  Communications middleware for tactical environments: Observations, experiences, and lessons learned , 2009, IEEE Communications Magazine.

[3]  Spyros Galanis,et al.  The Value of Information Under Unawareness , 2015, J. Econ. Theory.

[4]  John Schultz,et al.  Collaborative applications at the Tactical Edge through resilient group dissemination in DTN , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[5]  Cesare Stefanelli,et al.  Peer-to-peer communications for tactical environments: Observations, requirements, and experiences , 2010, IEEE Communications Magazine.

[6]  Sheila Frankel,et al.  IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap , 2011, RFC.

[7]  B. Parvathavarthini,et al.  An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management , 2017, Wirel. Pers. Commun..

[8]  Nistala V. E. S. Murthy,et al.  Provably secure group key agreement protocol based on ECDH with integrated signature , 2016, Secur. Commun. Networks.

[9]  Emin Anarim,et al.  A secure and efficient group key agreement approach for mobile ad hoc networks , 2017, Ad Hoc Networks.

[10]  H. Seifert,et al.  Automatic multicast IPsec by using a proactive IPsec discovery protocol and a group key management , 2008 .

[11]  Adi Shamir,et al.  Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.

[12]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[13]  V. S. Janani,et al.  Enhanced Security Using Cluster Based Certificate Management and ECC-CRT Key Agreement Schemes in Mobile Ad hoc Networks , 2017, Wirel. Pers. Commun..

[14]  Gene Tsudik,et al.  An architecture for key management in hierarchical mobile ad-hoc networks , 2004, Journal of Communications and Networks.

[15]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..