Wireless Personal Communications

, Volume 91, Issue 3, pp 1297–1319 | Cite as

Improved Hierarchical Key Management Scheme (IHKMS) with Three Phase Technique for Ad-Hoc Networks

Article
  • 116 Downloads

Abstract

This research presents an improved hierarchical key management scheme (IHKMS) with three phase technique for secure group communications in Mobile Ad-hoc Networks (MANETs). It extends two previously proposed models named enhanced hierarchical key agreement scheme (EHKMS) and EHKMS with three phase technique which suffer from two main problems. The first one which exists in both models is that, the main subgroup controller (L1-head) is heavily loaded and has a lot of responsibilities which may lead to its failure. The second problem that exists only in EHKMS is intrusion attacks which may appear in two aspects; frank intrusion and selfish attack. This problem is a fatal one which threatens the security of the system. The proposed IHKMS with three phase technique solves the above mentioned problems. First, it decreases the memory load on the main subgroup header to save its memory resources by distributing a major part of subgroup keys storage into the second level of subgroups headers. Second, it immunizes the IHKMS against intrusions by employing the three phase technique. Applying the three phase technique integrates a certification authentication system in addition to the hierarchal key system used in the IHKMS. The proposed IHKMS with three phase technique enhances EHKMS and EHKMS with three phase technique. It improves the system’s reliability in EHKMS, and EHKMS with three phase technique by minimizing the subgroup header’s load. Also, it overcomes the intrusion problem that exists only in EHKMS. On the other hand, the complexity of the proposed IHKMS with three phase technique is higher than that of EHKMS. This is anticipated result as the proposed model integrates the three phase technique with the IHKMS.

Keywords

Mobile ad-hoc networks (MANETs) Intrusion detection system (IDS) Hierarchical key management schemes (HKMS) 

References

  1. 1.
    Elaskily, M. A., Kelash, H. M., & Faragallah, O. S. (2012). An enhanced hierarchical key management scheme for MANETs. Wireless Personal Communication, 72, 1783–1800. doi: 10.1007/s11277-012-0910-1.CrossRefGoogle Scholar
  2. 2.
    Cheng, Y., Huang, C., & Shi, W. (2007). Trusted dynamic source routing protocol. In Proceedings of IEEE international conference on wireless communications, networking and mobile computing (pp. 1632–1636).Google Scholar
  3. 3.
    Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000) Mitigating routing mis-behavior in mobile ad hoc networks. In Proceedings of 6th annual international conference on mobile computing and networking (pp. 255–265).Google Scholar
  4. 4.
    Buchegger, S., & Le Boudec, J. Y. (2002) Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes: Fairness In Dynamic Adhoc NeTwork). In Proceedings of international IEEE conference on mobile ad hoc networking and computing.Google Scholar
  5. 5.
    Miranda, H., & Rodrigues, L. (2005). Preventing selfishness in open mobile ad hoc networks. In Proceedings of international IEEE conference on wireless communication and networking Google Scholar
  6. 6.
    Madhavi, S., & Kim, T. H. (2008). An intrusion detection system in mobile adhoc networks. In Proceedings of international journal of security and its applications (vol. 2, no. 3).Google Scholar
  7. 7.
    Balakrishnan, K., Deng, J., & Pramod, V. K. (2005). TWOACK: Preventing selfishness in mobile ad hoc networks. In Proceedings of international IEEE conference on wireless communication and networking. Google Scholar
  8. 8.
    Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E. & Mouftah, H. (2010) AACK: Adaptive acknowledgment intrusion detection for MANET with node detection enhancement. In Proceedings of 24th international IEEE conference on advanced information networking and applications.Google Scholar
  9. 9.
    Arya, K. V., Vashistha, P. & Gupta, V. Three phase technique for intrusion detection in mobile ad hoc network. In Proceedings of Wireless Personal Communication (pp. 675–684).Google Scholar
  10. 10.
    Huang, D. & Medhi, D. (2007). A secure key management scheme for hierarchical mobile ad hoc networks. Elsevier’s Ad Hoc Networks, 6(4), 560–577.CrossRefGoogle Scholar
  11. 11.
  12. 12.
    Mobile Ad Hoc Networking (MANET). http://cs.itd.nrl.navy.mil/work/manet/index.php.
  13. 13.
    Dynamic Source Routing Protocol. http://en.wikipedia.org/wiki/DynamicSourceRouting.
  14. 14.
    Xenakis, C., Panos, C., & Stavrakakis, I. (2011). A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Computers & Security, 30, 63–80.CrossRefGoogle Scholar
  15. 15.
    Soliman, H. H., Hikal, N. A., & Sakr, N. A. (2012). A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. Egyptian Informatics Journal, 13, 225–238.CrossRefGoogle Scholar
  16. 16.
    Sen, J., Ukil, A., Bera, D., & Arpan Pal. A distributed intrusion detection system for wireless ad hoc networks. In Proceeding og 16th IEEE international conference on networks (ICON 2008), New Delhi, 12–14 Dec (pp. 1–6).Google Scholar
  17. 17.
    Mitchell, R., & Chen, I.-R. (2014). A survey of intrusion detection in wireless network applications. Computer Communications, 42, 1–23.CrossRefGoogle Scholar
  18. 18.
    Di Pietro, R., Guarino, S., Verde, N. V., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks—A survey. Computer Communications, 51, 1–20.CrossRefGoogle Scholar
  19. 19.
    Nadeem, A., & Howarth, M. P. (2014). An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Networks, 13, 368–380.CrossRefGoogle Scholar
  20. 20.
    Sen, S., & Clark, J. A. (2011). Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks, 55, 3441–3457.CrossRefGoogle Scholar
  21. 21.
    Mishra, A., Nadkarni, K., & Patcha, A. (2004). Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications, 11(1), 48–60.CrossRefGoogle Scholar
  22. 22.
    Sen, S., & Clark, J. A. (2009). Intrusion detection in mobile ad hoc networks, Chapter 17 (pp. 427–454). Heidelberg: Springer.Google Scholar
  23. 23.
    Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5), 56–63.CrossRefGoogle Scholar
  24. 24.
    Komninos, N., & Douligeris, C. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Journal of Ad Hoc Networks, 7, 171–182.CrossRefGoogle Scholar
  25. 25.
    Cho, J.-H., & Chen, I.-R. (2011). Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Journal of Performance Evaluation, 68, 58–75.CrossRefGoogle Scholar
  26. 26.
    El-Zoghdy, S. F., & Asem, Y. M. (2011). Secure group re-keying using key inverses. Journal of High Speed Networks, 18(1), 47–68.Google Scholar
  27. 27.
    Mitrokotsa, A., Komninos, N., & Douligeris, C. (2007). Intrusion detection & response in ad-hoc networks. In Advances in Ad Hoc Network Security, International Journal on Computer Research (vol. 15, pp. 23–55). Nova Science Publishing Inc.Google Scholar
  28. 28.
    Cao, J., Liao, L., & Wang, G. (2006). Scalable key management for secure multicast communication in the mobile environment. Pervasive and Mobile Computing, 2(2), 187–203.CrossRefGoogle Scholar
  29. 29.
    Jun, Z., Yo, Z., Fanyuan, M., Dawu, G., & Yingcai, B. (2006). An extension of secure group communication using key graph. Elsevier’s Information Sciences, 176, 3060–3078.MathSciNetCrossRefGoogle Scholar
  30. 30.
    Ng, W. H. D., Howarth, M., Sun, Z., & Cruickshank, H. (2007) Dynamic balanced key tree management for secure multicast communications. IEEE Computers Transactions, 56(5), 590–605.Google Scholar
  31. 31.
    Peyravian, M., Matyas, S. M., & Zunic, N. (1999). Decentralized group key management for secure multicast communications. Elsevier’s Computer Communications, 22, 1183–1187.CrossRefGoogle Scholar
  32. 32.
    Rafaeli, S., & Hutchinson, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309–329.CrossRefGoogle Scholar
  33. 33.
    Chan, X., Ma, B. N. W., & Yang, C. (2007). M-CLIQUES: Modified CLIQUES key agreement for secure multicast. Elsevier’s Computers and Security, 26, 138245.Google Scholar
  34. 34.
    Jacoby, G. A., & Davis, N. J. (2007). Mobile host-based intrusion detection and attack identification. IEEE Wireless Communications, 14(4), 53–60.CrossRefGoogle Scholar
  35. 35.
    Lauf, A., Peters, R. A., & Robinson, W. H. (2010). A distributed intrusion detection system for resource-constrained devices in ad hoc networks. Ad Hoc Networks, 8(3), 253–266.CrossRefGoogle Scholar
  36. 36.
    Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks,. doi: 10.1155/2013/167575.Google Scholar
  37. 37.
    Wang, W., Man, H., & Liu, Y. (2009). A framework for intrusion detection systems by social network analysis methods in ad hoc networks. Wiley Security and Communication Networks, 2(6), 669–685.Google Scholar
  38. 38.
    Razak, S. A., Furnell, S. M., Clarke, N. L., & Brooke, P. J. (2008). Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks, 6(7), 1151–1167.CrossRefGoogle Scholar
  39. 39.
    Ma, C., & Fang, Z. (2009). A novel intrusion detection architecture based on adaptive selection event triggering for mobile ad-hoc networks. In Proceedings of IEEE 2nd international symposium on intelligent information technology and security informatics (pp. 198–201), January 2009.Google Scholar
  40. 40.
    Elboukhari, M., Azizi, M., & Azizi, A. (2015). Intrusion detection systems in mobile ad hoc networks: state of the art. International Journal on Computational Sciences & Applications (IJCSA), 5(2), 27–36.CrossRefGoogle Scholar
  41. 41.
    Wang, N., & Fang, S. (2007). A hierarchical key management scheme for secure group communications in mobile ad hoc networks. Journal of Systems and Software, 80(10), 1667–1677.CrossRefGoogle Scholar
  42. 42.
    Pieprzyk, J., & Li, C.-H. (2000). Multiparty key agreement protocols. IEE Proceedings Computers and Digital Techniques, 147(4), 229–236.CrossRefGoogle Scholar
  43. 43.
    Elaskily, M. A. (2013). Investigation of security techniques for mobile ad hoc networks. MSc Thesis, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University.Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Department of Computer Science and Engineering, Faculty of Electronic EngineeringMenoufia UniversityMenoufEgypt
  2. 2.Department of Mathematics and Computer Science, Faculty of ScienceMenoufia UniversityShebin El-KomEgypt
  3. 3.Department of Information Technology, College of Computers and Information TechnologyTaif UniversityAl-HawiyaSaudi Arabia

Personalised recommendations