Abstract
The growing popularity of wireless ad hoc networks has brought increasing attention to many security issues for such networks. A lot of research has been carried out in the areas of authentication and key management for such networks. However, due to lack of existing standards for such networks, most of the proposed schemes are based on different assumptions and are applicable only in specific environments. Recently Balachandran et al. proposed CRTDH [1], a novel key agreement scheme for group communications in wireless ad hoc networks. The protocol has many desirable properties such as efficient computation of group key and support for high dynamics. However, the protocol does not discuss mutual authentication among the nodes and hence, suffers from two kinds of attacks: man-in-the-middle attack and Least Common Multiple (LCM) attack. This paper identifies the problems with the current CRTDH scheme and discusses these attacks. AUTH-CRTDH, a modified key agreement protocol with authentication capability, is also presented. Results from extensive experiments that were run on the proposed protocol and some other key agreement protocols including CRTDH are also discussed. It can be observed from the experiments that the new scheme is comparable with the CRTDH scheme and better than many other non-authenticated schemes in terms of performance.
This work was partially supported by the U.S. NSF grant CCR-0311577.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Balachandran, R., Ramamurthy, B., Zou, X., Vinodchandran, N.: CRTDH: An efficient key agreement scheme for secure group communications in wireless ad hoc networks. In: Proceedings of IEEE ICC 2005 (2005)
Luo, W., Fang, Y.: A survey of wireless security in mobile ad hoc networks: Challenges and Solutions. In: Ad Hoc Wireless Networking, pp. 319–364. Kluwer Academic Publishers, Dordrecht (2003)
Weimerskirch, A., Thonet, G.: A distributed light-weight authentication model for ad-hoc networks. In: Proceedings of the 4th International Conference Seoul on Information Security and Cryptology, pp. 341–354 (2001)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)
Wu, B., Wu, J., Fernandez, E., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. In: Proceedings of the 1st Int’l Workshop on Systems and Network Security (SNS 2005) (2005)
Khalili, A., Katz, J., Arbaugh, W.: Toward secure key distribution in truly ad-hoc networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003) (2003)
Perrig, A., Canetti, R., Tygar, D., Song, D.: The TESLA broadcast authentication protocol. Cryptobytes 5(2), 2–13 (2002); (RSA Laboratories, Summer/Fall 2002)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks. In: IEEE International Conference on Distributed Computing Systems (2003)
Lu, B., Pooch, U.: A lightweight authentication protocol for ad-hoc networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2005) (2005)
Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, pp. 172–194. Springer, Heidelberg (2000)
Ingemarsson, I., Tang, D., Wong, C.: A conference key distribution system. IEEE Transactions on Information Theory 28(5), 714–720 (1982)
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: ACM Conference on Computer and Communications Security (ACM CCS 1996), pp. 31–37 (1996)
Steiner, M., Tsudik, G., Waidne, M.: Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems 11(8), 769–780 (2000)
Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: A new approach to group key agreement. In: IEEE International Conference on Distributed Computing Systems (ICDCS 1997), pp. 380–387 (1997)
Steer, D.G., Strawczynski, L., Diffie, W., Wiener, M.: A secure audio teleconference system. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 520–528. Springer, Heidelberg (1990)
Dai, W.: Crypto++ library (2005), At: http://www.escimo.com/weidai/cryptlib.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zou, X., Thukral, A., Ramamurthy, B. (2006). An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2006. Lecture Notes in Computer Science, vol 4325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11943952_43
Download citation
DOI: https://doi.org/10.1007/11943952_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49932-9
Online ISBN: 978-3-540-49933-6
eBook Packages: Computer ScienceComputer Science (R0)