Abstract
Securing wireless mobile ad hoc networks (MANETs) is challenging due to the lack of centralized authority and poor connectivity. A key distribution mechanism is central to any public key management scheme. We propose a novel key distribution scheme for MANETs that exploits the routing infrastructure to effectively chain peer nodes together. Keying material propagates along these virtual chains via a message relaying mechanism. We show that the proposed approach results in a key distribution scheme with low implementation complexity, ideally suited for stationary ad hoc networks and MANETs with low to high mobility. The proposed scheme uses mobility as an aid to fuel the rate of bootstrapping the routing security, but in contrast to existing schemes does not become dependent on mobility. The key dissemination occurs completely on-demand; security associations are only established as needed by the routing protocol. We show through simulations that the scheme’s communication and computational overhead has negligible impact on network performance.
This work was supported by ARMSCOR, the Armaments Corporation of South Africa.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network: Special Issue on Network Security 13(6), 24–30 (1999)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Trans. on Mobile Computing 2(1), 52–64 (2003)
Capkun, S., Hubaux, J., Buttyan, L.: Mobility Helps Peer-to-Peer Security. IEEE Trans. on Mobile Computing 5(1), 43–51 (2006)
Hu, Y.C., Johnson, D.B., Perrig, A.: Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks. In: Proc. Eighth ACM International Conf. on Mobile Computing and Networking (Mobicom) (2002)
Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: IEEE Workshop on Mobile Computing Systems and Applications (2002)
Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad Hoc Networks. In: Proc. SCS Communication Network and Distributed System Modeling and Simulation Conf. (2002)
Guerrero Zapata, M.: Secure Ad Hoc On-demand Distance Vector (SAODV) Routing (September, 15 2005) INTERNET-DRAFT draft-guerrero-manet-saodv-04.txt
Acs, G., Buttyan, L., Vajda, I.: Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks. IEEE Trans. on Mobile Computing 5(11), 1533–1546 (2006)
Guerrero Zapata, M.: Key Management and Delayed Verification for Ad Hoc Networks. In: Proc. International Conference on High Performance Computing (HiPC): 3rd International Trusted Internet Workshop (TIW) (2004)
Guerrero Zapata, M.: Key management and Delayed Verification for Ad hoc networks. Journal of High Speed Networks 15(1), 93–109 (2006)
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: Proc. Seventh International Symposium on Computers and Communications (ISCC) (2002)
Yi, S., Kravets, R.: MOCA: Mobile certificate authority for wireless ad hoc networks. In: Proc. of the 2nd Annual PKI Research Workshop (PKI) (2003)
Bobba, R.B., Eschenauer, L., Gligor, V.D., Arbaugh, W.: Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks. In: Proc. IEEE Global Telecommunications Conf. (2003)
Guerrero Zapata, M.: Secure Ad Hoc On-demand Distance Vector (SAODV) Routing. ACM Mobile Computing and Communications Review (MC2R) 6(3), 106–107 (2002)
Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: 30th Annual ACM Symposium on the Theory of Computing, pp. 419–428 (1998)
Cagalj, M., Capkun, S., Hubaux, J.: Key agreement in peer-to-peer wireless networks. Proceedings of the IEEE (Special Issue on Cryptography and Security) 94(2), 467–478 (2005)
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, Springer, Heidelberg (1994)
The Network Simulator - ns-2, available at http://www.isi.edu/nsnam/ns or http://nsnam.isi.edu/nsnam/index.php/User_Information
Boundec Le, J.Y., Vojnovic, M.: Perfect Simulation and Stationarity of a Class of Mobility Models. In: Proc. IEEE INFOCOM (2005)
Navidi, W., Camp, T.: Stationary Distributions for the Random Waypoint Mobility Model. IEEE Trans. on Mobile Computing 3(1), 99–108 (2004)
Perkins, C.E., Belding-Royer, E.M.: Ad-hoc On-demand Distance Vector Routing. In: Proc. The Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) (1999)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
van der Merwe, J., Dawoud, D., McDonald, S. (2007). Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds) Security and Privacy in Ad-hoc and Sensor Networks. ESAS 2007. Lecture Notes in Computer Science, vol 4572. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73275-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-73275-4_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73274-7
Online ISBN: 978-3-540-73275-4
eBook Packages: Computer ScienceComputer Science (R0)