Skip to main content
Log in

An Enhanced Hierarchical Key Management Scheme for MANETs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Security is one of the major issues in Mobile Ad-hoc Networks (MANETs). Their natural characteristics make them vulnerable to numerous severe attacks. In this paper, we present an enhanced hierarchical key management scheme for secure group communications in MANETs. The proposed approach primarily aims at improving security and complexity, especially complexity in the level of ordinary members for joining or leaving processes to achieve the most possible dynamic characteristic of MANETs without neglecting network security. The proposal scheme is designed with the potential of developing an efficient model interested in keying applied on hierarchical structure to increase the security and make no need to apply rekeying of all group members in different sub-levels as made by hierarchical key management scheme (HKMS). Also, it reduces complexity of processing load, memory usage and improves resources. In the proposed model, each communication between two nodes have a unique key to make it more secure with encrypting messages by different keys for more than one time and support node flexibility. Experiments are carried out on the proposed scheme to show the effect of complexity on each node in different grades and results are compared with traditional HKMS.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Iwata A., Chiang C. C., Pei G., Gerla M., Chen T. W. (1999) Scalable routing strategies for ad hoc wireless networks. IEEE Journal on Selected Areas in Communications 17(8): 1369–1379

    Article  Google Scholar 

  2. Pei, G., Gerla, M., Hong, X., & Chi, C. C. (1999). A wireless hierarchical routing protocol with group mobility. In Proceedings of the IEEE wireless communications and networking conference (WCNC), pp. 1538–1542.

  3. Ramanathan R., Steenstrup M. (1998) Hierarchically-organized, multi-hop mobile wireless networks for quality-of-service support. Mobile Networks and Applications 3(1): 101–119

    Article  Google Scholar 

  4. Mirkovic, J., Prier, G., & Reiher, P. (2002). Attack DDoS at the source. In Proceedings of the IEEE international conference on network protocol, pp. 312–321, Paris, France, November 12–15.

  5. Jones C. E., Sivalingam K. M., Agrawal P., Chen J. C. (2001) A survey of energy enhanced network protocols for wireless networks. Wireless Network 7(4): 343–358

    Article  MATH  Google Scholar 

  6. Hegland A. M., Winjum E., Mjolsness S. F., Rong C., Kure O., Spiling P. (2006) A survey of key management in ad hoc networks. IEEE Communication Surveys 8(3): 48–66

    Article  Google Scholar 

  7. Huang D., Medhi D. (2008) A secure group key management scheme for hierarchical mobile ad hoc networks. Ad Hoc Networks 6(4): 560–577

    Article  Google Scholar 

  8. Pieprzyk, J., & Li, C. H. (2000). Multiparty key agreement protocols. IEEE Proceedings Computers and Digital Techniques (July), 229–236.

  9. Steiner, M., Tsudik, G., & Waidner, M. (1998). A new approach to group key agreement. In Proceedings of the 18th IEEE international conference on distributed computing system, Amsterdam, The Netherlands, May 26–29, pp. 380–387.

  10. Wu B., Wu J., Fernandez E. B. (2007) Secure and enhanced key management in mobile ad hoc networks. Journal of Network and Computer Applications 30: 937–954

    Article  Google Scholar 

  11. Tseng, Y. M., Yang, C. C., & Liao, D. R. (2008). A secure group communication protocol for ad hoc wireless networks. Advances in Wireless Ad Hoc and Sensor Networks, Signals and Communication Technology, pp. 102–130.

  12. Wang N., Fang S. (2007) A hierarchical key management scheme for secure group communications in mobile ad hoc networks. Journal of Systems and Software 80(10): 1667–1677

    Article  MathSciNet  Google Scholar 

  13. Basagni, S., Herrin, K., Bruschi, D., & Rosti, E. (2001). Secure pebblenets. In Proceedings of the 2nd ACM international symposium on mobile ad hoc networking & computing, ACM Press New York, pp. 156–163.

  14. Rhee K., Park Y., Tsudik G. (2004) An architecture for key management in hierarchical mobile ad-hoc networks. Journal of Communications and Networks 6(2): 156–162

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama S. Faragallah.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Elaskily, M.A., Kelash, H.M., El-sayed, H.S. et al. An Enhanced Hierarchical Key Management Scheme for MANETs. Wireless Pers Commun 72, 1783–1800 (2013). https://doi.org/10.1007/s11277-012-0910-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-012-0910-1

Keywords

Navigation