Advertisement

Abstract

The migration from wired network to wireless network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc Network (MANET) is one of the most important and unique applications. MANET is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. Due to the nature of unreliable wireless medium data transfer is a major problem in MANET and it lacks security and reliability of data. A Key management is vital part of security. This issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult task in MANET and when a member leaves or joins it need to generate a new key to maintain forward and backward secrecy. In this paper, we propose a Clustering based Group Key Management scheme (CGK) that is a simple, efficient and scalable Group Key management for MANETs and different other schemes are classified. Group members compute the group key in a distributed manner.

Keywords

Group Key management Mobile Ad hoc network MANET security Unicast/Multicast protocols in MANET 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Younis, M., Ozer, S.Z.: Wireless ad hoc networks: technologies and challenges. Wireless Communications and Mobile Computing 6(7), 889–892 (2006)CrossRefGoogle Scholar
  2. 2.
    Guo, S., Yang, O.W.W.: Energy-aware multicasting in wireless ad hoc networks: A survey and discussion. Computer Communications 30(9), 2129–2148 (2007)CrossRefGoogle Scholar
  3. 3.
    Wang, J., Wang, C., Wu, Q. (eds.): Ad Hoc Mobile Wireless Network. National Defense Industry Press, Beijing (2004)Google Scholar
  4. 4.
    Xiao, C., Jie, W.: Multicasting techniques in mobile ad hoc networks. In: Mohammad, I., Richard, C.D. (eds.) Handbook of Ad Hoc Wireless Networks, pp. 25–40. CRC Press, Inc. (2003)Google Scholar
  5. 5.
    Junhai, L., Danxia, Y.: Research on routing security in MANET. Application Research of Computers 25(1), 243–245 (2008)Google Scholar
  6. 6.
    Renuka, A., Shet, K.C.: Hierarchical Approach for Key Management in Mobile Ad hoc Networks. Int. Journal of Computer Science and Information Security (IJCSIS) 5(1), 87–95 (2009)Google Scholar
  7. 7.
    Bouassida, M.-S., Chrisment, I., Festor, O.: Group Key Management in MANETs. International Journal of Network Security (IJNS) 6(1), 67–79 (2008)Google Scholar
  8. 8.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)MathSciNetzbMATHCrossRefGoogle Scholar
  9. 9.
    Harn, L., Mehta, M., Wen-Jung, H.: Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA). IEEE Communications Letters 8(3), 198–200 (2004)CrossRefGoogle Scholar
  10. 10.
    Phan, R.C.W.: Fixing the integrated Diffie-Hellman-DSA key exchange protocol. IEEE Communications Letters 9(6), 570–572 (2005)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Francis, M., Sangeetha, M., Sabari, A.: A survey of key Management Technique for Secure and Reliable Data Transmission in MANET. International Journal of Advanced Research in Computer Science and Software Engineering (IJAARCSSE) 3(1), 22–27 (2013)Google Scholar
  12. 12.
    Hongmei, D., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Communications Magazine 40(10), 70–75 (2002)CrossRefGoogle Scholar
  13. 13.
    Abusalah, L., Khokhar, A., Guizani, M.: A survey of secure mobile Ad Hoc routing protocols. IEEE Communications Surveys & Tutorials 10(4), 78–93 (2008)Google Scholar
  14. 14.
    Johnsort, D.B.: Routing in Ad Hoc Networks of Mobile Hosts. In: The First Workshop on Mobile Computing Systems and Applications, WMCSA 1994 (1994)Google Scholar
  15. 15.
    Wenjing, L., Wei, L., Yuguang, F.: SPREAD: Enhancing data confidentiality in mobile ad hoc networks. In: Proceedings of the Twenty-Third Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003. IEEE Societies (2004)Google Scholar
  16. 16.
    Hauser, R., et al.: Lowering Security Overhead in Link State Routing. Computer Networks 31(8), 885–894 (1999)CrossRefGoogle Scholar
  17. 17.
    Yih-Chun, H., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003. IEEE Societies (2003)Google Scholar
  18. 18.
    Sonja, B., Jean-Yves, B.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking Computing. ACM, Lausanne (2002)Google Scholar
  19. 19.
    Park, V.D., Corson, M.S.: A highly adaptive distributed routing algorithm for mobile wireless networks. In: Proceedings of the Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 1997. Driving the Information Revolution. IEEE (1997)Google Scholar
  20. 20.
    Sergio, M., et al.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. ACM, Boston (2000)Google Scholar
  21. 21.
    Garcia-Luna-Aceves, J.J., Spohn, M.: Source-tree routing in wireless networks. In: Proceedings of the Seventh International Conference on Network Protocols, ICNP 1999 (1999)Google Scholar
  22. 22.
    Yong, W., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials 8(2), 2–23 (2006)CrossRefGoogle Scholar
  23. 23.
    Papadimitratos, P., Haas, Z.J.: Secure Routing: Secure Data Transmission in Mobile Ad Hoc Networks. In: ACM Workshop on Wireless Security, WiSe 2003, San Diego, California, USA (2003)Google Scholar
  24. 24.
    Lilien, L.: Developing Pervasive Trust Paradigm for Authentication and Authorization. In: Cracow Grid Workshop. Institute of Computer Science, AGH University of Science and Technology, Cracow,Poland Academic Computer Centre CYFRONET AGH (2004)Google Scholar
  25. 25.
    Jacquet, P., Muhlethaler, P., Qayyum, A.: Optimized Link State Routing Protocol. RFC 3626 (2003) Google Scholar
  26. 26.
    Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 1999 (1999)Google Scholar
  27. 27.
    Clausen, T.H., et al.: The Optimized Link State Routing Protocol Evaluation through Experiments and Simulation. In: Proceedings of the IEEE Symposium on Wireless Personal Mobile Communications. Mindpass Center for Distributed Systems, Aalborg University, Fredrik Bajers Vej 7E, DK-9220 Aalborg, Denmark (2001)Google Scholar
  28. 28.
    Manel-Guerrero, Z.: Secure ad hoc on-demand distance vector routing. SIGMOBILE Mob. Computer Communications Review 6(3), 106–107 (2002)CrossRefGoogle Scholar
  29. 29.
    Yih-Chun, H., David, B.J.: Securing quality-of-service route discovery in on-demand routing for ad hoc networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, ACM, Washington, DC (2004)Google Scholar
  30. 30.
    Chen, X., Wu, J.: Multicasting techniques in mobile ad-hoc networks. The Handbook of Ad-hoc Wireless Networks, 25–40 (2003)Google Scholar
  31. 31.
    Singh, T.P., Neha, Das, V.: Multicast Routing Protocols in MANETs. International Journal of Advanced Research in Computer Science and Software Engineering (IJAARCSSE) 2(1), 1–6 (2012)Google Scholar
  32. 32.
    Luo, J.: A survey of multicast routing protocols for mobile Ad-Hoc networks. IEEE Communications Surveys & Tutorials 11(1), 78–91 (2009)CrossRefGoogle Scholar
  33. 33.
    Meghanathan, N.: Survey of Topology-based Multicast Routing Protocols for Mobile Ad hoc Networks. International Journal of Communication Networks and Information Security (IJCNIS) 3(2), 124–137 (2011)Google Scholar
  34. 34.
    Junhai, L., Liu, X., Danxia, Y.: Research on multicast routing protocols for mobile ad-hoc networks. Computer Networks 52(5), 988–997 (2008)zbMATHCrossRefGoogle Scholar
  35. 35.
    Siva, C., Murthy, R., Manoj, B.S.: Ad Hoc Wireless Networks Architectures and Protocols. Prentice Hall PTR, Upper Saddle River (2004)Google Scholar
  36. 36.
    Toh, C.K.: Ad Hoc Wireless Networks: Protocols and Systems, 1st edn. Prentice Hall PTR, Upper Saddle River (2001)Google Scholar
  37. 37.
    Chan, A.C.F.: Distributed symmetric key management for mobile ad hoc networks. In: The Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2004 (2004)Google Scholar
  38. 38.
    Aziz, B., Nourdine, E., Mohamed, E.K.: A Recent Survey on Key Management Schemes in MANET. In: Proceedings of the 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2008 (2008)Google Scholar
  39. 39.
    Anderson, R., Haowen, C., Perrig, A.: Key infection: smart trust for smart dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004 (2004)Google Scholar
  40. 40.
    del Valle, G., Gómez Cárdenas, R.: Overview the key management in ad hoc networks. In: Ramos, F.F., Larios Rosillo, V., Unger, H. (eds.) ISSADS 2005. LNCS, vol. 3563, pp. 397–406. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  41. 41.
    Bing, W.: Secure and efficient key management in mobile ad hoc networks. Journal of Networks and Computer Applications 30(3), 937–954 (2007)MathSciNetCrossRefGoogle Scholar
  42. 42.
    Anil, K., Sanjeev, R.: Identity-Based Key Management in MANETs using Public Key Cryptography. International Journal of Security (IJS) 3(1), 1–26 (2009)Google Scholar
  43. 43.
    Bing, W., Yuhong, J.W.: An efficient group key management scheme for mobile ad hoc networks. International Journal of Security and Networks (IJSN) 4(2), 125–134 (2009)Google Scholar
  44. 44.
    Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  45. 45.
    Pushpa, L., Kumar, A.V.A.: Cluster Based Composite Key Management in Mobile Ad Hoc Networks. International Journal of Computer Applications 4(7), 30–35 (2010)CrossRefGoogle Scholar
  46. 46.
    Thair, K., Aref, A.: A Hybrid Schema Zone-Based Key Management for MANETs. Journal of Theoritical and Applied Information Technology (JATIT) 35(2), 175–183 (2012)Google Scholar
  47. 47.
    Chiang, C.-C.: Routing In Clustered Multihop, Mobile Wireless Networks With Fading Channel. In: Proceedings of IEEE SICON (1997)Google Scholar
  48. 48.
    Wei, W., Zakhor, A.: Multiple Tree Video Multicast over Wireless Ad Hoc Networks. IEEE Transactions on Circuits and Systems for Video Technology 17(1), 2–15 (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Ayman El-Sayed
    • 1
  1. 1.Department of Computer Science and Engineering, Faculty of Electronic EngineeringMenoufiya UniversityMenoufEgypt

Personalised recommendations