Abstract
Recently there have been a noticeable growth of ad-hoc environments with peer-to-peer relations. Such environments decentralize the services in order to share their cost between their members. As a result, a decentralized security scheme for the group members must be also provided. Group Key Management (GKM) deals with the responsibility of providing privacy and group authentication in group communications, but until now it is based either in centralized solutions, useless for peer-to-peer groups, or in contributory key schemes, that require a known group size. We propose a GKM algorithm targeted to ad-hoc environments that it is decentralized and allows members to only know their one-hop neighbors. Moreover our presented algorithm can deal with the potential mobility of the ad-hoc devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wallner, D., Harder, E., Agee, R.: Key management for multicast: issues and architectures. RFC 2627 (1998)
Harney, H.: Logical Key Hierarchy Protocol (LKH). Internet Draft, Harney-sparta-lkhp-sec-00 (1999)
Balenson, D.M., McGrew, D., Sherman, A.: Key management for large dynamic groups: One-way function trees and amortized initialization. In: IRTF SMUG Meeting, Internet Draft draft-balenson-groupkeymgmt-oft-00.txt (1999)
Li, Y., Gouda, L.: Batch Rekeying for Secure Group Communications. In: ACM SIGCOMM 2001, San Diego. ACM Press, New York (2001)
Harney, M.: Group Key Management Protocol Architecture. IETF RFC2094 (1997)
Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. Technical Report 2002/009 (2002)
Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems (2000)
Zhou, L., Haas, Z.: Securing ad. hoc. networks. IEEE Network 13(6), 24–30 (1999)
Jiejun, K., Petros, Z., Luo, H., Songwu, L., Zhang, L.: Providing robust and ubiquitous security support for mobile ad-hoc networks. In: IEEE Ninth International Conference on Network Protocols, pp. 251–260. IEEE Computer Society Press, Los Alamitos (2001)
Hubaux, J., Buttyán, L., Capkun, S.: The quest for security in mobile ad. hoc. networks. In: Proceedings of the 2001 ACM Iternational Symposium on Mobile Ad. Hoc. Networking & Computing, MobiHoc, Long Beach, CA, pp. 146–155. ACM Press, New York (2001)
Basagni, S., Conti, M., Giordano, S., Stojmenovic, I.: Mobile ad. hoc. networking. Wiley-Interscience. John Wiley & sons, Inc. 94 (2004) ISBN 0-471-37313-3
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hernández-Serrano, J., Pegueroles, J., Soriano, M. (2007). Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_49
Download citation
DOI: https://doi.org/10.1007/978-3-540-74477-1_49
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74475-7
Online ISBN: 978-3-540-74477-1
eBook Packages: Computer ScienceComputer Science (R0)