Abstract
With rapid growth of Ad Hoc Networks consisting of low power computing devices, security will be an important factor for their full implementation. Because of scarcity of resources in terms of computing capability and energy efficiency, designing of computationally efficient group key management protocols with dynamic topology is a major concern. Teo and Tan [11] proposed an energy-efficient generalized circular hierarchical group model, but this approach suffers from: (i) exponential increase of key messages due to dynamic topology and (ii) energy loss because the vicinity of nodes in a subgroup is high. This work is an extension of Teo & Tan’s circular hierarchical model for fixed number of group members. The proposed modification overcomes these two weaknesses of Teo & Tan’s protocol. The proposed modifications make this protocol secure against replay, masquerading, spoofing, chosen ciphertext and impersonation attacks because of proper authentication and digital signatures. The comparative numerical and simulation analysis of proposed approach has been made with Teo & Tan, Wen-Lin-Hwang’s (WLH) and along with Tseng’s group key agreement approach. The analysis shows that proposed approach is well suited for low computational mobile devices with minimum delay. Through WLH protocol shows maximum throughput and minimum delay however it lacks in terms of security aspects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment, 1st edn. Springer (2003)
van Tilborg, H.C.A.: Encyclopedia of Cryptography and Security. Springer (2005)
Hellman, M.E.: An Overview of Public Key Cryptography. IEEE Communications Society Magazine 16, 24–32 (1978)
Wen, H.A., Lin, C.L., Hwang, T.: Provably secure authenticated key exchange protocols for low power computing clients. Computers and Security 25, 106–113 (2006)
Vesteras, B.: Analysis of Key Agreement Protocols. Master’s Thesis Report, Department of Computer Science and Media Technology, Gjovik University College (2006)
Tseng, Y.M.: Efficient authenticated key agreement protocols resistant to a denial of service attack. International Journal of Network Management 15, 193–202 (2005)
Tseng, Y.M.: Cryptanalysis and improvement of key distribution system for csat satellite communication. Informatica 13(3), 369–376 (2002)
Tseng, Y.M.: An improved conference key agreement protocol with forward secrecy. Informatica 16(2), 275–284 (2005)
Tseng, Y.M.: A communication efficient and fault tolerant conference key agreement protocol with forward secrecy. Journal of Systems and Software 80, 1091–1101 (2007)
Lee, S., Kim, J., Hong, S.J.: Security weakness of Tseng’s fault tolerant conference key agreement protocol. Journal of Systems and Software 82, 1163–1167 (2009)
Teo, J.C.M., Tan, C.H.: Energy-Efficient and Scalable Group Key Agreement for Large Ad Hoc Networks. In: PE-WASUN’s 2005, October 10-13, pp. 114–121 (2005)
Dijkstra, E.W.: A note on two problems in connexion with graphs. Numerische Mathematik 1, 269–271 (1959)
Gutjahr, W.J.: A graph-based Ant System and its convergence. Future Generation Computer Systems 16, 873–888 (2000)
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)
Perkins, C.E.: Ad hoc Networking. Addison-Wesley, New York (2001)
Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Prentice-Hall (2010)
Mao, W.: Modern Cryptography: Theory and Practice. Prentice Hall PTR (2004)
Krawczyk, H.: SKEME: A Versatile Secure Key Exchange Mechanism for Internet. In: Proc. of the Symposium on Network and Distributed System Security, pp. 114–127 (1996)
Harkins, D., Carrel, D.: The Internet Key Exchange Internet Request for Comments 2409 (November 1998)
Kaufman, C., Hoffman, P., Nir, Y., Eronen, P.: Internet Key Exchange Protocol version 2 (IKEv2), Internet Request for Comments 5996 (September 2010)
Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA), Internet Request for Comments 4187 (2006)
Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)
Ingemarsson, I., Tang, D.T., Wong, C.K.: A Conference key distribution system. IEEE Transactions on Information Theory 28(5), 714–720 (1982)
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: ACM Conference on Computer and Communication Security, pp. 31–37 (1996)
Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. In: International Conference on Computer and Communication Security, pp. 17–26 (1998)
Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: A new approach to group key agreement. In: Proc. of the 18th International Conference on Distributed Computing Systems, pp. 380–387 (1998)
Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems 11(8), 769–780 (2000)
Burmester, M., Desmedt, Y.G.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Harney, H., Muckenhirn, C.: Group Key Management Protocol Architecture, Internet Request for Comments 2094 (July 1997)
Harney, H., Muckenhirn, C.: Group Key Management Protocol Specification, Internet Request for Comments 2093 (July 1997)
Harney, H., Meth, U., Colegrove A.: Group Secure Association Key Management Protocol, Internet Request for Comments 4535 (June 2006)
Weis, B., Rowles, S., Hardjono, T.: The Group Domain of Interpretation, Internet Request for Comments 6407 (October 2011)
Baugher, M., Weis, B., Hardjono, J., Harney, H.: The Group Domain of Interpretation, Internet Request for Comments 3547 (July 2003)
Spinrad, J.: Recognition of circle graphs. Journal of Algorithms 16(2), 264–282 (1994)
Aziz, A., Diffie, W.: Privacy and Authentication for Wireless Local Area Networks. IEEE Personal Communications 1, 25–31 (1994)
Merwe, J.V.D., Dowoud, D., McDonald, S.: A Survey on Peer to Peer key management for Mobile Ad Hoc Network. ACM Computing Surveys 39(1), Article 1 (2007)
NS3 Simulator, http://www.nsnam.org
Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for Key Management – Part 1:General. NIST Special Publication 800-57, Rev. 3, 1–143 (2011)
Lu, Y.F., Kuo, C.F., Pang, A.C.: A Novel Key Management Scheme for Wireless Embedded Systems. SIGAPP Applied Computing Review 12(1), 50–59 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kumar, A., Aggarwal, A., Charu (2012). Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks. In: Parashar, M., Kaushik, D., Rana, O.F., Samtaney, R., Yang, Y., Zomaya, A. (eds) Contemporary Computing. IC3 2012. Communications in Computer and Information Science, vol 306. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32129-0_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-32129-0_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32128-3
Online ISBN: 978-3-642-32129-0
eBook Packages: Computer ScienceComputer Science (R0)