ABSTRACT
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both intra and inter group multicast traffic must be protected by secret keys. We propose a mechanism that integrates polynomials with flat tables to achieve personal key share distribution and efficient key refreshment during group changes. The proposed mechanism distributes keys via true broadcast. The contributions of the research include: (1) By switching from asymmetric algorithms to symmetric encryption methods, the proposed mechanism avoids heavy computation, and improves the processing efficiency of multicast traffic and the power usage at the wireless nodes. The group managers do not have to generate public-private key pairs when the group member changes. (2) It becomes more difficult for an attacker to impersonate another node since personal key shares are adopted. The additional storage overhead at the wireless nodes and the increased broadcast traffic during key refreshment are justified. In addition, we describe techniques to improve the robustness of the proposed mechanism under the complicated scenarios such as collusive attacks and batch group member changes.
- S. Yi, P. Naldurg, and R. Kravets. Security-aware ad hoc routing for wireless networks. In Proc. of ACM International Symposium on Mobile Ad Hoc Networking & Computing, 299--302, 2001. Google ScholarDigital Library
- M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner. The VersaKey Framework: Versatile group key management. IEEE JSAC Special issue on middleware, 17(9), 1614--1631, 1999. Google ScholarDigital Library
- I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha. Key management for secure internet multicast using boolean function minimization techniques. In IEEE INFOCOM, 689--698, 1999.Google Scholar
- T. Hodes and R. Katz. Composable ad hoc location based services for heterogeneous mobile clients. Wireless Networks, 5(5):411--427, 1999. Google ScholarDigital Library
- J. Agre, A. Akinyemi, L. Ji, R. Masuoka, and P. Thakkar. A layered architecture for location based services in wireless ad hoc networks. In Proc. of IEEE Aerospace Conference, 2002.Google ScholarCross Ref
- H. Harney and C. Muckenhirn. Group Key Management Protocol (GKMP) Architecture. RFC 2094, 1999. Google ScholarDigital Library
- D. Wallner, E. Harder, and R. Agee. Key Management for Multicast: Issues and Architectures. RFC 2627, 1999. Google ScholarDigital Library
- C.K. Wong, M.G. Gouda, and S.S. Lam. Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8(1), 16--30, 2000. Google ScholarDigital Library
- D.A. McGrew and A.T. Sherman. Key establishment in large dynamic groups using oneway function trees. Tech. Rep. No. 0755, Network Associates, Inc., 1998.Google Scholar
- R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast Security: A Taxonomy and Some Efficient Constructions. In IEEE INFOCOM, 708--716, 1999.Google Scholar
- R. Canetti, T. Malkin, and K. Nissim. Efficient communication-storage tradeoffs for multicast encryption. In Advances in Cryptology -- EUROCRYPT, 459--474, 1999. Google ScholarDigital Library
- A. Perrig, D. Song, and J.D. Tygar. ELK, a new protocol for efficient large-group key distribution. In Proc. of IEEE Symposium on Security and Privacy, 2001. Google ScholarDigital Library
- S. Mittra. Iolus: A framework for scalable secure multicasting. In ACM SIGCOMM, 277--288, 1997. Google ScholarDigital Library
- L. Dondeti, S. Mukherjee, and A. Samal. Scalable secure one-to-many group communication using dual encryption. Computer Communications, 23(17), 1681--1701, 1999. Google ScholarDigital Library
- R. Molva and A. Pannetrat. Scalable multicast security in dynamic groups. In Proc. of ACM CCS, 101--112, 1999. Google ScholarDigital Library
- S. Rafaeli and D. Hutchison. Hydra: A decentralized group key management. In Proc. of IEEE International Enterprise Security Workshop, 2002. Google ScholarDigital Library
- B. Briscoe. MARKS: Multicast key management using arbitrarily revealed key sequences. In Proc. of International Workshop on Networked Group Communication, 1999. Google ScholarDigital Library
- S. Setia, S. Koussih, and S. Jajodia. Kronos: A scalable group re-keying approach for secure multicast. In Proc. of IEEE Symposium on Security and Privacy, 2000. Google ScholarDigital Library
- R. Pietro, L. Mancini, Y. Law, S. Etalle, and P. Havinga. LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In Proc. of IEEE International Conference on Parallel Processing Workshops, 2003.Google ScholarCross Ref
- T. Kaya, G. Lin, G. Noubir, and A. Yilmaz. Secure multicast groups on ad hoc networks. In Proc. of ACM workshop on security of ad hoc and sensor networks, 94 -- 102, 2003. Google ScholarDigital Library
- L. Lazos and R. Poovendran. Location-Aware Secure Wireless Multicast in Ad-Hoc Networks under Heterogeneous Pathloss. Technical Report UWEETR-2003-0012, University of Washington, 2003.Google Scholar
- L. Lazos and R. Poovendran. Energy-Aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information. In Proc. of IEEE International Conference on Acoustics Speech and Signal Processing, 2003.Google ScholarCross Ref
- S. Mäki, T. Aura, and M. Hietalahti. Robust Membership Management for Ad-hoc Groups. in Proc. of Nordic Workshop on Secure IT Systems, 2000.Google Scholar
- A. Yasinsac, V. Thakur, S. Carter, and I. Cubukcu. A Family of Protocols for Group Key Generation in Ad Hoc Networks. In Proc. o IASTED International Conference on Communications and Computer Networks, 183--187, 2002.Google Scholar
- B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang. Secure Group Communications for Wireless Networks. In IEEE MILCOM, 2001.Google ScholarCross Ref
- D. Bruschi and E. Rosti. Secure multicast in wireless networks of mobile hosts: protocols and issues. Mobile Networks and Applications, 7(6), 503--511, 2002. Google ScholarDigital Library
- M. Moharrum, R. Mukkamala, and M. Eltoweissy. CKDS: An Efficient Combinatorial Key Distribution Scheme for Wireless Ad-Hoc Networks. In Proc. of IEEE International Conference on Performance, Computing, and Communications, 631--636, 2004.Google Scholar
- S. Zhu, S. Setia, S. Xu, and S. Jajodia. GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. In Proc. of International Conference on Mobile and Ubiquitous Systems: Networking and Services, 42--51, 2004.Google Scholar
- A. Shamir. How to share a secret. Communications of the ACM, 22, 612--613, 1979. Google ScholarDigital Library
- J. Staddon, S.Miner, M. Franklin, D. Balfanz, M. Malkin, and D. Dean. Self-Healing Key Distribution with Revocation. In Proc. of IEEE Symposium on Security and Privacy, 2002. Google ScholarDigital Library
- D. Liu, P. Ning, and K. Sun. Efficient self-healing group key distribution with revocation capability. In Proc. of ACM conference on Computer and communications security, 231--240, 2003. Google ScholarDigital Library
- D. Liu, P. Ning, and R. Li. Establishing Pairwise Keys in Distributed Sensor Networks. In ACM Transactions on Information and System Security, 8(1), 41--77, 2005. Google ScholarDigital Library
- S.M. More, M. Malkin, J. Staddon, and D. Balfanz. Sliding-window self-healing key distribution. In Proc. of ACM workshop on Survivable and self-regenerative systems, 82--90, 2003. Google ScholarDigital Library
- R. Pickholtz, D. Schilling, and L. Milstein. Theory of spread spectrum communications -- a tutorial. IEEE Trans. Comm., 1982.Google ScholarCross Ref
- V. Gupta, S. Krishnamurthy, and M. Faloutsos. Denial of service attacks at the MAC layer in wireless ad hoc networks. In Proc. of Milcom, 2002.Google ScholarCross Ref
- P. Bjorklund, P. Varbrand, and D. Yuan. Resource optimization of spatial TDMA in ad hoc radio networks: A column generation approach. In IEEE INFOCOM, 2003.Google ScholarCross Ref
- M. Steiner, G. Tsudik, and M. Waidner. Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems, 11(8):769--780, 2000. Google ScholarDigital Library
- S.T. Redwine Jr. A Logic for the Exclusion Basis System. In Proc. of the Hawaii International Conference on System Sciences (HICSS), 2004. Google ScholarDigital Library
- L. Morales, I.H. Sudborough, M. Eltoweissy, and M.H. Heydari. Combinatorial Optimization of Multicast Key Management. In Proc. of the Hawaii International Conference on System Sciences, 2003. Google ScholarDigital Library
- B. Bhargava and Y. Zhong. Authorization Based on Evidence and Trust. In Proc. of Data Warehouse and Knowledge Management Conference (DaWak), 2002. Google ScholarDigital Library
- Y. Zhong. Formalization of Dynamic Trust and Uncertain Evidence for User Authorization. Ph.D. Thesis, Dept. of CS, Purdue University, 2005. Google ScholarDigital Library
- N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha. Analyzing the energy consumption of security protocols. In Proc. of International symposium on Low power electronics and design, 30--35, 2003. Google ScholarDigital Library
- P. Ni and Z. Li. Energy Cost Analysis of IPSec on Handheld Devices. Microprocessors and Microsystems, special issue on Secure Computing Platform, 28(10), 585--594, 2004.Google Scholar
- X. Chen and J. Wu. Multicasting techniques in mobile ad hoc networks. In The handbook of ad hoc wireless networks, 25--40, CRC Press, Inc., 2003. Google ScholarDigital Library
- L. Ji and M. Corson. Differential destination multicast - a MANET multicast routing protocol for small groups, In Proc. of IEEE INFOCOM, 2001.Google Scholar
- L. Ji and M. Corson. Explicit multicasting for mobile ad hoc networks. In Mobile Networks and Applications, 8(5), 535--549, 2003. Google ScholarDigital Library
- K. Chen and K. Nahrstedt. Effective Location-Guided Tree Construction Algorithms for Small Group Multicast in MANET, In Proc. of IEEE INFOCOM, 1180--1189, 2002.Google ScholarCross Ref
- C. Gui and P. Mohapatra. Efficient Overlay Multicast for Mobile Ad Hoc Networks, In Proc. of IEEE Wireless Communications and Networking Conference (WCNC), 2003.Google Scholar
- S. Vasudevan, B. DeCleene, N. Immerman, J. Kurose, and D. Towsley. Secure Leader Election Algorithms for Wireless Ad Hoc Networks. In Proc. of IEEE DARPA Information Survivability Conference and Exposition (DISCEX), 2003.Google ScholarCross Ref
Index Terms
- Key distribution and update for secure inter-group multicast communication
Recommendations
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both intra and inter-group multicast traffic must be protected by secret keys. We ...
Full-Duplex Inter-Group All-to-All Broadcast Algorithms with Optimal Bandwidth
EuroMPI '18: Proceedings of the 25th European MPI Users' Group MeetingMPI inter-group collective communication patterns can be viewed as bipartite graphs that divide processes into two disjoint groups in which messages are transferred between but not within the groups. Such communication patterns can serve as basic ...
Secure and efficient dynamic program update in wireless sensor networks
Dynamic program update protocols provide a convenient way to reprogram sensor nodes after deployment. However, designing a secure program update protocol for wireless sensor networks is a difficult task because wireless networks are susceptible to ...
Comments