Advertisement

Modeling Protocols for Secure Group Communications in Ad Hoc Networks

  • Alec Yasinsac
  • James A. Davis
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2845)

Abstract

Since its introduction as a communications medium, wireless technology has found broad application on the battlefield. Accompanying dramatic advances in wireless technology and the capabilities associated with small computing devices, the demand for advanced mechanisms to employ wireless technology in the battlefield continues to grow. We propose a model for deriving and reasoning about security protocols designed for battlefield use in ad hoc wireless networks. We contend that our model facilitates reasoning about protocols by integrating the communications and cryptographic aspects of battlefield group communication, and allows automated reasoning about resulting protocols. We illustrate our concept by introducing protocols to support special communication cases associated with the battlefield.

Keywords

Security Protocol Multicast Group Tactical Plan Multicast Communication Multicast Address 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. In: ACM CCS ACM (November 1998)Google Scholar
  2. 2.
    Burrows, M., Abadi, M., Needham, R.M.: A Practical Study in Belief and Action. In: Vardi, M. (ed.) Proc of the 2nd Conf on Theoretical Aspects of Reasoning about Knowledge, Asilomar, Ca., February 1988, pp. 325–342. Morgan Kaufmann, Los Altos (1988)Google Scholar
  3. 3.
    Cheriton, D.R., Deering, S.E.: Host Groups: A Multicast Extension for Datagram Internetworks. In: 9th Data Communication Symposium (September 1985)Google Scholar
  4. 4.
    Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proc. IEEE Infocom (March 1999)Google Scholar
  5. 5.
    Diffie, W., Hellman, M.: New Directions In Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Diffie, W., van Oorshot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchanges. Codes and Cryptography 2(2), 107–125 (1992)CrossRefMathSciNetGoogle Scholar
  7. 7.
    Fischer, M., Wright, R.N.: An Efficient Protocol for Unconditionally Secure Secret Key Exchange. In: Proc of the 4th Symp on Discrete Algorithms, pp. 475–483 (1993)Google Scholar
  8. 8.
    Hardjono, T., Cain, B., Dorawswamy, N.: A framework for group key management for multicast security, IETF Internet draft (August 2000), draft-ietf-ipsecgkmframework-03.txt
  9. 9.
    Harn, L., Kiesler, T.: Authenticated Group Key Distribution Scheme For a Large Distributed Network. In: IEEE Symposium on Security and Privacy, pp. 300–309 (1989)Google Scholar
  10. 10.
    Meadows, C.: A System for the Specification and Analysis of Key Management Protocols. In: IEEE Computer Society Symp on Research in Security and Privacy, pp. 182–195 (1991)Google Scholar
  11. 11.
    Meadows, C., Narendran, P.: A Unification Algorithm for the Group Diffie- Hellman Protocol. In: WITS (in conjunction with POPL 2002), Portland, Oregon, USA (January 14-15, 2002)Google Scholar
  12. 12.
    Moyer, M.J., Rao, J.R., Rohatgi, P.: A survey of security issues in multicast communications. In: IEEE Network, November/December 1999, pp. 12–23 (1999)Google Scholar
  13. 13.
    Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. CACM 21(12), 993–999 (1978)zbMATHGoogle Scholar
  14. 14.
    Ramalho, M.: Intra and inter-domain multicast routing protocols: A survey and a taxonomy. IEEE Communications Surveys & Tutorials 3(1), 2–25 (2000)CrossRefGoogle Scholar
  15. 15.
    Reiter, M.: A secure group membership protocol. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA (May 1994)Google Scholar
  16. 16.
    Shields, C., Garcia-Luna-Aceves, J.J.: KHIP—A scalable protocol for secure multicast routing. In: ACM SIGCOMM (1999)Google Scholar
  17. 17.
    Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: Proc. 3rd ACM CCS, New Dehli, India, May 14-16, pp. 31–37 (1996)Google Scholar
  18. 18.
    Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Alec Yasinsac
    • 1
  • James A. Davis
    • 2
  1. 1.Computer Science DepartmentFlorida State University 
  2. 2.Department of Electrical and Computer EngineeringIowa State University 

Personalised recommendations