Abstract
Mobile Ad-hoc networks (MANETs), providing infrastructure-free wireless instant communication, play important role in tactical military networks. However, providing security in tactical military MANETs, having very large and dynamic structure without infrastructure support in hostile environments, is a very difficult task. In order to address security problems in tactical military MANETs, we propose a new HIerarchical MUlti-Tier adaptive ad-hoc network security protocol based on SIgncryption type key exchange Schemes: HIMUTSIS. Our protocol makes contribution to the military MANETs in three major points: Architectural design, cryptographic methods used in military MANETs and key management techniques. Novel architectural design of HIMUTSIS facilitates certification and key management procedures, provides flexibility and reduces cryptographic workload of the military MANETs. In HIMUTSIS, as a novelty, we offer to use DKEUTS (Direct Key Exchange Using TimeStamp) protocol providing security and performance advantages when compared to some traditional cryptographic methods. Also, multi-security level approach provides adaptive solutions for each layer of the HIMUTSIS. As a key management technique, HIMUTSIS uses hybrid key management approach which reduces rekeying workload of the networks significantly while minimizing single point of failure risk of the military MANET.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gu, D.L., Pei, G., Ly, H., Gerla, M., Hong, X.: Hierarchical Routing for Multi-layer Ad-hoc Wireless Networks with UAVs. In: IEEE MILCOM (2000)
Kong, J., Luo, H., Xu, K., Lihui Gu, D., Gerla, M., Lu, S.: Adaptive Security for Multi-layer Ad Hoc Networks. Wireless Communications and Mobile Computing, Special Issue on Mobile Ad Hoc Networking 2, 533–547 (2002)
Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. Computer Communications 23(18), 1627–1637 (2000)
Zhou, L., Hass, Z.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)
Zheng, Y.: Shortened digital signature, signcryption, and compact and unforgeable key agreement schemes (A contribution to IEEE P1363 Standard for Public Key Cryptography) (July 1998)
Altay Yavuz, A., Alagoz, F., Anarim, E.: A new satellite multicast security protocol based on elliptic curve signatures. In: IEEE International Conference on Information Communication Technologies (ICTTA) (April 2006)
Altay Yavuz, A., Alagoz, F., Anarim, E.: Three-Tiers satellite multicast security protocol based on ECMQV and IMC methods. In: Computer-Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD 2006) (2006)
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Groups. In: Proc. 3rd ACM Symp. on Computer and Communications Security, March 1996, vol. 1, pp. 31–37 (1996)
Yao, G., Ren, K., Bao, F., Deng, R., Feng, D.: Making the Key Agreement Protocol in Mobile Ad Hoc Network More Efficient. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 343–356. Springer, Heidelberg (2003)
Augot, D., Bhaskar, R., Issarny, V., Sacchetti, D.: An Efficient Group Key Agreement Protocol for Ad hoc Networks. In: IEEE Workshop on Trust, Security and Privacy in Ubiquitous Computing, Taormina, Italy (2005)
Rafaeli, D.H.S.: A survey of key management for secure group communications. ACM Comp. Surveys 35(3), 309–329 (2003)
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)
Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. IETF, RFC2627 (June 1999)
Balenson, D., et al.: Key management for large dynamic groups: One way function trees and amortized initialization. IETF Draft, work-in progress, draft-balenson-groupkeymgmt-oft-00.txt (February 1999)
Perrig, A., Song, D., Tygar, J.D.: ELK, a new protocol for efficient large-group key distribution. In: IEEE Security and Privacy Symposium (May 2001)
Mittra, S.: Iolus: A framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM 1997 (September 1997)
Altay Yavuz, A., Alagoz, F., Anarim, E.: NAMEPS: N -Tier Satellite Multicast Security Protocol Based on Signcryption Schemes. In: IEEE Globecom Conference, San Francisco (to appear, 2006)
Rhee, Y.P., Tsudik, G.: A group key management architecture in mobile ad-hoc wireless networks. Journal Of Communication and Networks 6(2), 156–162 (2004)
Gu, D.L., Pei, G., Ly, H., Gerla, M., Zhang, B., Hong, X.: UAV-aided Intelligent Routing for Ad-hoc Wireless Network in Single-area Theater. In: IEEE WCNC, pp. 1220–1225 (2000)
Zheng, Y.: Digital signcryption or how to achieve Cost(Signature Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Zheng, Y., Imai, H.: Compact and unforgeable key establishment over an ATM network. In: Proceedings of IEEE INFOCOM 1998, pp. 411–418, 29/3–3/4 (1998)
Stinson, D.: Cryptography Theory and Practice, 3rd edn. CRC Press, Boca Raton (2005)
Anashin, V., Bogdanov, A., Kizhvatov, I.: ABC: A New Flexible Stream Cipher
Altay Yavuz, A.: Novel Methods for Security Mechanisms and Key Management Techniques in Wireless Networks Based on Signcryption and Hybrid Cryptography. MS Thesis, Boğaziçi University (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yavuz, A.A., Alagoz, F., Anarim, E. (2006). HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes. In: Levi, A., Savaş, E., Yenigün, H., Balcısoy, S., Saygın, Y. (eds) Computer and Information Sciences – ISCIS 2006. ISCIS 2006. Lecture Notes in Computer Science, vol 4263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11902140_47
Download citation
DOI: https://doi.org/10.1007/11902140_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-47242-1
Online ISBN: 978-3-540-47243-8
eBook Packages: Computer ScienceComputer Science (R0)