A novel framework of secure network management for wireless and mobile networks

In wireless and mobile networks, the importance of network management becomes prominent, due to the prevalence of personal computing devices. These devices are able to offer their users with great convenience and flexible mobility. However, when the size of such a network is scalable, the difficulty of secure network management increases accordingly. In this paper, we primarily study the issues of secure network management. First of all, the necessity of managing a network in a securely way is discussed, along with the features of wireless devices and mobile networks. Then, we propose a secure framework for network management and group communication. In the proposed framework, a set of secure management mechanisms are involved to ensure the functions of group management and to protect the reliability of data exchange. The analysis of security mechanisms provides the provable secure properties of our framework, which is resilient to malicious behavior and able to guarantee the security of a network. Therefore, our proposed framework demonstrates a reliable paradigm for secure management and communication in wireless ad hoc networks.

[1]  Phu Dung Le,et al.  Group Key Management in Wireless Networks Using Session Keys , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[2]  Edward J. Delp,et al.  A new secure group key management scheme for multicast over wireless cellular networks , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[3]  Kwang-Hui Lee A group communication protocol architecture for distributed network management systems , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.

[4]  James Bret Michael,et al.  Secure group management in large distributed systems: what is a group and what does it do? , 1999, NSPW '99.

[5]  Dong Hoon Lee,et al.  Secure and efficient key management for dynamic multicast groups , 2001, OPSR.

[6]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[7]  M. Mundy,et al.  Adaptive Multicast Key Management for Tactical Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[8]  Ludwig Seitz,et al.  Secure communication for ad-hoc, federated groups , 2008, IDtrust '08.

[9]  Bruno Studer Secure Network Management Integration of Security Mechanisms into Network Management Protocols , 1994, Proceedings of NOMS '94 - IEEE Network Operations and Management Symposium.

[10]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[11]  Azzedine Boukerche Handbook of Algorithms for Wireless Networking and Mobile Computing , 2005 .

[12]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks , 2008 .

[13]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks: Boukerche/Mobile , 2008 .

[14]  Yiling Wang,et al.  Hybrid Group Key Management Scheme for Secure Wireless Multicast , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).

[15]  K.J.R. Liu,et al.  JET: Dynamic Join-Exit-Tree Amortization and Scheduling for Contributory Key Management , 2006, IEEE/ACM Transactions on Networking.

[16]  Miss Laiha Mat Kiah,et al.  Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments , 2007, Future Generation Communication and Networking (FGCN 2007).

[17]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[18]  Yung-Fa Huang,et al.  Hierarchy-based key management for secure group communications in mobile ad hoc networks , 2007, IWCMC.

[19]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[20]  Su-Jin Lee,et al.  Multicast Session Management and QoS Management for Multicast Group Communications , 2008, 2008 International Conference on Information Networking.

[21]  Forouzan Golshani,et al.  A new framework for secure network management , 1997, Proceedings of Sixth International Conference on Computer Communications and Networks.

[22]  Xining Li,et al.  Large Scale Deployment a Mobile Agent Approach to Network Management , 2008, Seventh International Conference on Networking (icn 2008).

[23]  Azzedine Boukerche,et al.  A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..

[24]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[25]  Ben-Jye Chang,et al.  Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.