Skip to main content

Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 306))

Abstract

With rapid growth of Ad Hoc Networks consisting of low power computing devices, security will be an important factor for their full implementation. Because of scarcity of resources in terms of computing capability and energy efficiency, designing of computationally efficient group key management protocols with dynamic topology is a major concern. Teo and Tan [11] proposed an energy-efficient generalized circular hierarchical group model, but this approach suffers from: (i) exponential increase of key messages due to dynamic topology and (ii) energy loss because the vicinity of nodes in a subgroup is high. This work is an extension of Teo & Tan’s circular hierarchical model for fixed number of group members. The proposed modification overcomes these two weaknesses of Teo & Tan’s protocol. The proposed modifications make this protocol secure against replay, masquerading, spoofing, chosen ciphertext and impersonation attacks because of proper authentication and digital signatures. The comparative numerical and simulation analysis of proposed approach has been made with Teo & Tan, Wen-Lin-Hwang’s (WLH) and along with Tseng’s group key agreement approach. The analysis shows that proposed approach is well suited for low computational mobile devices with minimum delay. Through WLH protocol shows maximum throughput and minimum delay however it lacks in terms of security aspects.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment, 1st edn. Springer (2003)

    Google Scholar 

  2. van Tilborg, H.C.A.: Encyclopedia of Cryptography and Security. Springer (2005)

    Google Scholar 

  3. Hellman, M.E.: An Overview of Public Key Cryptography. IEEE Communications Society Magazine 16, 24–32 (1978)

    Article  Google Scholar 

  4. Wen, H.A., Lin, C.L., Hwang, T.: Provably secure authenticated key exchange protocols for low power computing clients. Computers and Security 25, 106–113 (2006)

    Article  Google Scholar 

  5. Vesteras, B.: Analysis of Key Agreement Protocols. Master’s Thesis Report, Department of Computer Science and Media Technology, Gjovik University College (2006)

    Google Scholar 

  6. Tseng, Y.M.: Efficient authenticated key agreement protocols resistant to a denial of service attack. International Journal of Network Management 15, 193–202 (2005)

    Article  Google Scholar 

  7. Tseng, Y.M.: Cryptanalysis and improvement of key distribution system for csat satellite communication. Informatica 13(3), 369–376 (2002)

    MATH  MathSciNet  Google Scholar 

  8. Tseng, Y.M.: An improved conference key agreement protocol with forward secrecy. Informatica 16(2), 275–284 (2005)

    MATH  MathSciNet  Google Scholar 

  9. Tseng, Y.M.: A communication efficient and fault tolerant conference key agreement protocol with forward secrecy. Journal of Systems and Software 80, 1091–1101 (2007)

    Article  Google Scholar 

  10. Lee, S., Kim, J., Hong, S.J.: Security weakness of Tseng’s fault tolerant conference key agreement protocol. Journal of Systems and Software 82, 1163–1167 (2009)

    Article  Google Scholar 

  11. Teo, J.C.M., Tan, C.H.: Energy-Efficient and Scalable Group Key Agreement for Large Ad Hoc Networks. In: PE-WASUN’s 2005, October 10-13, pp. 114–121 (2005)

    Google Scholar 

  12. Dijkstra, E.W.: A note on two problems in connexion with graphs. Numerische Mathematik 1, 269–271 (1959)

    Article  MATH  MathSciNet  Google Scholar 

  13. Gutjahr, W.J.: A graph-based Ant System and its convergence. Future Generation Computer Systems 16, 873–888 (2000)

    Article  Google Scholar 

  14. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  15. Perkins, C.E.: Ad hoc Networking. Addison-Wesley, New York (2001)

    Google Scholar 

  16. Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice-Hall (2010)

    Google Scholar 

  17. Mao, W.: Modern Cryptography: Theory and Practice. Prentice Hall PTR (2004)

    Google Scholar 

  18. Krawczyk, H.: SKEME: A Versatile Secure Key Exchange Mechanism for Internet. In: Proc. of the Symposium on Network and Distributed System Security, pp. 114–127 (1996)

    Google Scholar 

  19. Harkins, D., Carrel, D.: The Internet Key Exchange Internet Request for Comments 2409 (November 1998)

    Google Scholar 

  20. Kaufman, C., Hoffman, P., Nir, Y., Eronen, P.: Internet Key Exchange Protocol version 2 (IKEv2), Internet Request for Comments 5996 (September 2010)

    Google Scholar 

  21. Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA), Internet Request for Comments 4187 (2006)

    Google Scholar 

  22. Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  23. Ingemarsson, I., Tang, D.T., Wong, C.K.: A Conference key distribution system. IEEE Transactions on Information Theory 28(5), 714–720 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  24. Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: ACM Conference on Computer and Communication Security, pp. 31–37 (1996)

    Google Scholar 

  25. Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. In: International Conference on Computer and Communication Security, pp. 17–26 (1998)

    Google Scholar 

  26. Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: A new approach to group key agreement. In: Proc. of the 18th International Conference on Distributed Computing Systems, pp. 380–387 (1998)

    Google Scholar 

  27. Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems 11(8), 769–780 (2000)

    Article  Google Scholar 

  28. Burmester, M., Desmedt, Y.G.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  29. Harney, H., Muckenhirn, C.: Group Key Management Protocol Architecture, Internet Request for Comments 2094 (July 1997)

    Google Scholar 

  30. Harney, H., Muckenhirn, C.: Group Key Management Protocol Specification, Internet Request for Comments 2093 (July 1997)

    Google Scholar 

  31. Harney, H., Meth, U., Colegrove A.: Group Secure Association Key Management Protocol, Internet Request for Comments 4535 (June 2006)

    Google Scholar 

  32. Weis, B., Rowles, S., Hardjono, T.: The Group Domain of Interpretation, Internet Request for Comments 6407 (October 2011)

    Google Scholar 

  33. Baugher, M., Weis, B., Hardjono, J., Harney, H.: The Group Domain of Interpretation, Internet Request for Comments 3547 (July 2003)

    Google Scholar 

  34. Spinrad, J.: Recognition of circle graphs. Journal of Algorithms 16(2), 264–282 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  35. Aziz, A., Diffie, W.: Privacy and Authentication for Wireless Local Area Networks. IEEE Personal Communications 1, 25–31 (1994)

    Article  Google Scholar 

  36. Merwe, J.V.D., Dowoud, D., McDonald, S.: A Survey on Peer to Peer key management for Mobile Ad Hoc Network. ACM Computing Surveys 39(1), Article 1 (2007)

    Google Scholar 

  37. NS3 Simulator, http://www.nsnam.org

  38. Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for Key Management – Part 1:General. NIST Special Publication 800-57, Rev. 3, 1–143 (2011)

    Google Scholar 

  39. Lu, Y.F., Kuo, C.F., Pang, A.C.: A Novel Key Management Scheme for Wireless Embedded Systems. SIGAPP Applied Computing Review 12(1), 50–59 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kumar, A., Aggarwal, A., Charu (2012). Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks. In: Parashar, M., Kaushik, D., Rana, O.F., Samtaney, R., Yang, Y., Zomaya, A. (eds) Contemporary Computing. IC3 2012. Communications in Computer and Information Science, vol 306. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32129-0_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32129-0_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32128-3

  • Online ISBN: 978-3-642-32129-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics