Abstract
Security is one of the major issues in Mobile Ad-hoc Networks (MANETs). Their natural characteristics make them vulnerable to numerous severe attacks. In this paper, we present an enhanced hierarchical key management scheme for secure group communications in MANETs. The proposed approach primarily aims at improving security and complexity, especially complexity in the level of ordinary members for joining or leaving processes to achieve the most possible dynamic characteristic of MANETs without neglecting network security. The proposal scheme is designed with the potential of developing an efficient model interested in keying applied on hierarchical structure to increase the security and make no need to apply rekeying of all group members in different sub-levels as made by hierarchical key management scheme (HKMS). Also, it reduces complexity of processing load, memory usage and improves resources. In the proposed model, each communication between two nodes have a unique key to make it more secure with encrypting messages by different keys for more than one time and support node flexibility. Experiments are carried out on the proposed scheme to show the effect of complexity on each node in different grades and results are compared with traditional HKMS.
Similar content being viewed by others
References
Iwata A., Chiang C. C., Pei G., Gerla M., Chen T. W. (1999) Scalable routing strategies for ad hoc wireless networks. IEEE Journal on Selected Areas in Communications 17(8): 1369–1379
Pei, G., Gerla, M., Hong, X., & Chi, C. C. (1999). A wireless hierarchical routing protocol with group mobility. In Proceedings of the IEEE wireless communications and networking conference (WCNC), pp. 1538–1542.
Ramanathan R., Steenstrup M. (1998) Hierarchically-organized, multi-hop mobile wireless networks for quality-of-service support. Mobile Networks and Applications 3(1): 101–119
Mirkovic, J., Prier, G., & Reiher, P. (2002). Attack DDoS at the source. In Proceedings of the IEEE international conference on network protocol, pp. 312–321, Paris, France, November 12–15.
Jones C. E., Sivalingam K. M., Agrawal P., Chen J. C. (2001) A survey of energy enhanced network protocols for wireless networks. Wireless Network 7(4): 343–358
Hegland A. M., Winjum E., Mjolsness S. F., Rong C., Kure O., Spiling P. (2006) A survey of key management in ad hoc networks. IEEE Communication Surveys 8(3): 48–66
Huang D., Medhi D. (2008) A secure group key management scheme for hierarchical mobile ad hoc networks. Ad Hoc Networks 6(4): 560–577
Pieprzyk, J., & Li, C. H. (2000). Multiparty key agreement protocols. IEEE Proceedings Computers and Digital Techniques (July), 229–236.
Steiner, M., Tsudik, G., & Waidner, M. (1998). A new approach to group key agreement. In Proceedings of the 18th IEEE international conference on distributed computing system, Amsterdam, The Netherlands, May 26–29, pp. 380–387.
Wu B., Wu J., Fernandez E. B. (2007) Secure and enhanced key management in mobile ad hoc networks. Journal of Network and Computer Applications 30: 937–954
Tseng, Y. M., Yang, C. C., & Liao, D. R. (2008). A secure group communication protocol for ad hoc wireless networks. Advances in Wireless Ad Hoc and Sensor Networks, Signals and Communication Technology, pp. 102–130.
Wang N., Fang S. (2007) A hierarchical key management scheme for secure group communications in mobile ad hoc networks. Journal of Systems and Software 80(10): 1667–1677
Basagni, S., Herrin, K., Bruschi, D., & Rosti, E. (2001). Secure pebblenets. In Proceedings of the 2nd ACM international symposium on mobile ad hoc networking & computing, ACM Press New York, pp. 156–163.
Rhee K., Park Y., Tsudik G. (2004) An architecture for key management in hierarchical mobile ad-hoc networks. Journal of Communications and Networks 6(2): 156–162
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Elaskily, M.A., Kelash, H.M., El-sayed, H.S. et al. An Enhanced Hierarchical Key Management Scheme for MANETs. Wireless Pers Commun 72, 1783–1800 (2013). https://doi.org/10.1007/s11277-012-0910-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-012-0910-1