Springer Nature is making Coronavirus research free. View research | View latest news | Sign up for updates

An Enhanced Hierarchical Key Management Scheme for MANETs

  • 177 Accesses

  • 1 Citations


Security is one of the major issues in Mobile Ad-hoc Networks (MANETs). Their natural characteristics make them vulnerable to numerous severe attacks. In this paper, we present an enhanced hierarchical key management scheme for secure group communications in MANETs. The proposed approach primarily aims at improving security and complexity, especially complexity in the level of ordinary members for joining or leaving processes to achieve the most possible dynamic characteristic of MANETs without neglecting network security. The proposal scheme is designed with the potential of developing an efficient model interested in keying applied on hierarchical structure to increase the security and make no need to apply rekeying of all group members in different sub-levels as made by hierarchical key management scheme (HKMS). Also, it reduces complexity of processing load, memory usage and improves resources. In the proposed model, each communication between two nodes have a unique key to make it more secure with encrypting messages by different keys for more than one time and support node flexibility. Experiments are carried out on the proposed scheme to show the effect of complexity on each node in different grades and results are compared with traditional HKMS.

This is a preview of subscription content, log in to check access.


  1. 1

    Iwata A., Chiang C. C., Pei G., Gerla M., Chen T. W. (1999) Scalable routing strategies for ad hoc wireless networks. IEEE Journal on Selected Areas in Communications 17(8): 1369–1379

  2. 2

    Pei, G., Gerla, M., Hong, X., & Chi, C. C. (1999). A wireless hierarchical routing protocol with group mobility. In Proceedings of the IEEE wireless communications and networking conference (WCNC), pp. 1538–1542.

  3. 3

    Ramanathan R., Steenstrup M. (1998) Hierarchically-organized, multi-hop mobile wireless networks for quality-of-service support. Mobile Networks and Applications 3(1): 101–119

  4. 4

    Mirkovic, J., Prier, G., & Reiher, P. (2002). Attack DDoS at the source. In Proceedings of the IEEE international conference on network protocol, pp. 312–321, Paris, France, November 12–15.

  5. 5

    Jones C. E., Sivalingam K. M., Agrawal P., Chen J. C. (2001) A survey of energy enhanced network protocols for wireless networks. Wireless Network 7(4): 343–358

  6. 6

    Hegland A. M., Winjum E., Mjolsness S. F., Rong C., Kure O., Spiling P. (2006) A survey of key management in ad hoc networks. IEEE Communication Surveys 8(3): 48–66

  7. 7

    Huang D., Medhi D. (2008) A secure group key management scheme for hierarchical mobile ad hoc networks. Ad Hoc Networks 6(4): 560–577

  8. 8

    Pieprzyk, J., & Li, C. H. (2000). Multiparty key agreement protocols. IEEE Proceedings Computers and Digital Techniques (July), 229–236.

  9. 9

    Steiner, M., Tsudik, G., & Waidner, M. (1998). A new approach to group key agreement. In Proceedings of the 18th IEEE international conference on distributed computing system, Amsterdam, The Netherlands, May 26–29, pp. 380–387.

  10. 10

    Wu B., Wu J., Fernandez E. B. (2007) Secure and enhanced key management in mobile ad hoc networks. Journal of Network and Computer Applications 30: 937–954

  11. 11

    Tseng, Y. M., Yang, C. C., & Liao, D. R. (2008). A secure group communication protocol for ad hoc wireless networks. Advances in Wireless Ad Hoc and Sensor Networks, Signals and Communication Technology, pp. 102–130.

  12. 12

    Wang N., Fang S. (2007) A hierarchical key management scheme for secure group communications in mobile ad hoc networks. Journal of Systems and Software 80(10): 1667–1677

  13. 13

    Basagni, S., Herrin, K., Bruschi, D., & Rosti, E. (2001). Secure pebblenets. In Proceedings of the 2nd ACM international symposium on mobile ad hoc networking & computing, ACM Press New York, pp. 156–163.

  14. 14

    Rhee K., Park Y., Tsudik G. (2004) An architecture for key management in hierarchical mobile ad-hoc networks. Journal of Communications and Networks 6(2): 156–162

Download references

Author information

Correspondence to Osama S. Faragallah.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Elaskily, M.A., Kelash, H.M., El-sayed, H.S. et al. An Enhanced Hierarchical Key Management Scheme for MANETs. Wireless Pers Commun 72, 1783–1800 (2013). https://doi.org/10.1007/s11277-012-0910-1

Download citation


  • Group communication
  • Mobile ad-hoc network
  • Network security