Skip to main content

HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes

  • Conference paper
Computer and Information Sciences – ISCIS 2006 (ISCIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4263))

Included in the following conference series:

Abstract

Mobile Ad-hoc networks (MANETs), providing infrastructure-free wireless instant communication, play important role in tactical military networks. However, providing security in tactical military MANETs, having very large and dynamic structure without infrastructure support in hostile environments, is a very difficult task. In order to address security problems in tactical military MANETs, we propose a new HIerarchical MUlti-Tier adaptive ad-hoc network security protocol based on SIgncryption type key exchange Schemes: HIMUTSIS. Our protocol makes contribution to the military MANETs in three major points: Architectural design, cryptographic methods used in military MANETs and key management techniques. Novel architectural design of HIMUTSIS facilitates certification and key management procedures, provides flexibility and reduces cryptographic workload of the military MANETs. In HIMUTSIS, as a novelty, we offer to use DKEUTS (Direct Key Exchange Using TimeStamp) protocol providing security and performance advantages when compared to some traditional cryptographic methods. Also, multi-security level approach provides adaptive solutions for each layer of the HIMUTSIS. As a key management technique, HIMUTSIS uses hybrid key management approach which reduces rekeying workload of the networks significantly while minimizing single point of failure risk of the military MANET.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gu, D.L., Pei, G., Ly, H., Gerla, M., Hong, X.: Hierarchical Routing for Multi-layer Ad-hoc Wireless Networks with UAVs. In: IEEE MILCOM (2000)

    Google Scholar 

  2. Kong, J., Luo, H., Xu, K., Lihui Gu, D., Gerla, M., Lu, S.: Adaptive Security for Multi-layer Ad Hoc Networks. Wireless Communications and Mobile Computing, Special Issue on Mobile Ad Hoc Networking 2, 533–547 (2002)

    Google Scholar 

  3. Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. Computer Communications 23(18), 1627–1637 (2000)

    Article  Google Scholar 

  4. Zhou, L., Hass, Z.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

  5. Zheng, Y.: Shortened digital signature, signcryption, and compact and unforgeable key agreement schemes (A contribution to IEEE P1363 Standard for Public Key Cryptography) (July 1998)

    Google Scholar 

  6. Altay Yavuz, A., Alagoz, F., Anarim, E.: A new satellite multicast security protocol based on elliptic curve signatures. In: IEEE International Conference on Information Communication Technologies (ICTTA) (April 2006)

    Google Scholar 

  7. Altay Yavuz, A., Alagoz, F., Anarim, E.: Three-Tiers satellite multicast security protocol based on ECMQV and IMC methods. In: Computer-Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD 2006) (2006)

    Google Scholar 

  8. Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Groups. In: Proc. 3rd ACM Symp. on Computer and Communications Security, March 1996, vol. 1, pp. 31–37 (1996)

    Google Scholar 

  9. Yao, G., Ren, K., Bao, F., Deng, R., Feng, D.: Making the Key Agreement Protocol in Mobile Ad Hoc Network More Efficient. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 343–356. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Augot, D., Bhaskar, R., Issarny, V., Sacchetti, D.: An Efficient Group Key Agreement Protocol for Ad hoc Networks. In: IEEE Workshop on Trust, Security and Privacy in Ubiquitous Computing, Taormina, Italy (2005)

    Google Scholar 

  11. Rafaeli, D.H.S.: A survey of key management for secure group communications. ACM Comp. Surveys 35(3), 309–329 (2003)

    Article  Google Scholar 

  12. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

  13. Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. IETF, RFC2627 (June 1999)

    Google Scholar 

  14. Balenson, D., et al.: Key management for large dynamic groups: One way function trees and amortized initialization. IETF Draft, work-in progress, draft-balenson-groupkeymgmt-oft-00.txt (February 1999)

    Google Scholar 

  15. Perrig, A., Song, D., Tygar, J.D.: ELK, a new protocol for efficient large-group key distribution. In: IEEE Security and Privacy Symposium (May 2001)

    Google Scholar 

  16. Mittra, S.: Iolus: A framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM 1997 (September 1997)

    Google Scholar 

  17. Altay Yavuz, A., Alagoz, F., Anarim, E.: NAMEPS: N -Tier Satellite Multicast Security Protocol Based on Signcryption Schemes. In: IEEE Globecom Conference, San Francisco (to appear, 2006)

    Google Scholar 

  18. Rhee, Y.P., Tsudik, G.: A group key management architecture in mobile ad-hoc wireless networks. Journal Of Communication and Networks 6(2), 156–162 (2004)

    Google Scholar 

  19. Gu, D.L., Pei, G., Ly, H., Gerla, M., Zhang, B., Hong, X.: UAV-aided Intelligent Routing for Ad-hoc Wireless Network in Single-area Theater. In: IEEE WCNC, pp. 1220–1225 (2000)

    Google Scholar 

  20. Zheng, Y.: Digital signcryption or how to achieve Cost(Signature Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)

    Google Scholar 

  21. Zheng, Y., Imai, H.: Compact and unforgeable key establishment over an ATM network. In: Proceedings of IEEE INFOCOM 1998, pp. 411–418, 29/3–3/4 (1998)

    Google Scholar 

  22. Stinson, D.: Cryptography Theory and Practice, 3rd edn. CRC Press, Boca Raton (2005)

    Google Scholar 

  23. Anashin, V., Bogdanov, A., Kizhvatov, I.: ABC: A New Flexible Stream Cipher

    Google Scholar 

  24. Altay Yavuz, A.: Novel Methods for Security Mechanisms and Key Management Techniques in Wireless Networks Based on Signcryption and Hybrid Cryptography. MS Thesis, Boğaziçi University (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yavuz, A.A., Alagoz, F., Anarim, E. (2006). HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes. In: Levi, A., Savaş, E., Yenigün, H., Balcısoy, S., Saygın, Y. (eds) Computer and Information Sciences – ISCIS 2006. ISCIS 2006. Lecture Notes in Computer Science, vol 4263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11902140_47

Download citation

  • DOI: https://doi.org/10.1007/11902140_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-47242-1

  • Online ISBN: 978-3-540-47243-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics