Skip to main content

An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks

  • Conference paper
Mobile Ad-hoc and Sensor Networks (MSN 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4325))

Included in the following conference series:

Abstract

The growing popularity of wireless ad hoc networks has brought increasing attention to many security issues for such networks. A lot of research has been carried out in the areas of authentication and key management for such networks. However, due to lack of existing standards for such networks, most of the proposed schemes are based on different assumptions and are applicable only in specific environments. Recently Balachandran et al. proposed CRTDH [1], a novel key agreement scheme for group communications in wireless ad hoc networks. The protocol has many desirable properties such as efficient computation of group key and support for high dynamics. However, the protocol does not discuss mutual authentication among the nodes and hence, suffers from two kinds of attacks: man-in-the-middle attack and Least Common Multiple (LCM) attack. This paper identifies the problems with the current CRTDH scheme and discusses these attacks. AUTH-CRTDH, a modified key agreement protocol with authentication capability, is also presented. Results from extensive experiments that were run on the proposed protocol and some other key agreement protocols including CRTDH are also discussed. It can be observed from the experiments that the new scheme is comparable with the CRTDH scheme and better than many other non-authenticated schemes in terms of performance.

This work was partially supported by the U.S. NSF grant CCR-0311577.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Balachandran, R., Ramamurthy, B., Zou, X., Vinodchandran, N.: CRTDH: An efficient key agreement scheme for secure group communications in wireless ad hoc networks. In: Proceedings of IEEE ICC 2005 (2005)

    Google Scholar 

  2. Luo, W., Fang, Y.: A survey of wireless security in mobile ad hoc networks: Challenges and Solutions. In: Ad Hoc Wireless Networking, pp. 319–364. Kluwer Academic Publishers, Dordrecht (2003)

    Google Scholar 

  3. Weimerskirch, A., Thonet, G.: A distributed light-weight authentication model for ad-hoc networks. In: Proceedings of the 4th International Conference Seoul on Information Security and Cryptology, pp. 341–354 (2001)

    Google Scholar 

  4. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

  5. Wu, B., Wu, J., Fernandez, E., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. In: Proceedings of the 1st Int’l Workshop on Systems and Network Security (SNS 2005) (2005)

    Google Scholar 

  6. Khalili, A., Katz, J., Arbaugh, W.: Toward secure key distribution in truly ad-hoc networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003) (2003)

    Google Scholar 

  7. Perrig, A., Canetti, R., Tygar, D., Song, D.: The TESLA broadcast authentication protocol. Cryptobytes 5(2), 2–13 (2002); (RSA Laboratories, Summer/Fall 2002)

    Google Scholar 

  8. Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks. In: IEEE International Conference on Distributed Computing Systems (2003)

    Google Scholar 

  9. Lu, B., Pooch, U.: A lightweight authentication protocol for ad-hoc networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2005) (2005)

    Google Scholar 

  10. Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–194. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  11. Ingemarsson, I., Tang, D., Wong, C.: A conference key distribution system. IEEE Transactions on Information Theory 28(5), 714–720 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  12. Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: ACM Conference on Computer and Communications Security (ACM CCS 1996), pp. 31–37 (1996)

    Google Scholar 

  13. Steiner, M., Tsudik, G., Waidne, M.: Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems 11(8), 769–780 (2000)

    Article  Google Scholar 

  14. Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: A new approach to group key agreement. In: IEEE International Conference on Distributed Computing Systems (ICDCS 1997), pp. 380–387 (1997)

    Google Scholar 

  15. Steer, D.G., Strawczynski, L., Diffie, W., Wiener, M.: A secure audio teleconference system. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 520–528. Springer, Heidelberg (1990)

    Google Scholar 

  16. Dai, W.: Crypto++ library (2005), At: http://www.escimo.com/weidai/cryptlib.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zou, X., Thukral, A., Ramamurthy, B. (2006). An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2006. Lecture Notes in Computer Science, vol 4325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11943952_43

Download citation

  • DOI: https://doi.org/10.1007/11943952_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49932-9

  • Online ISBN: 978-3-540-49933-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics