Abstract
Several protocols have been proposed to deal with the group key management problem in mobile ad hoc networks (MANETs). Most of these protocols organize the network into clusters to reduce the cost of key refresh or rekeying. Rekeying constitutes a challenging issue in group key management because it must be launched whenever the constitution of the group is altered following a leave or a join operation. However, cluster maintenance may also generate significative communication overhead. So, the clustering algorithm is an important factor in the performance of any key management solution. A clustering algorithm that ensures stable clusters in spite of mobility is very appreciable in mobile ad hoc networks. In fact, all the overhead due to the traffic generated by cluster adjustments and the related rekeying procedures will be saved. As far as we know, no existing clustering algorithm takes into account self-stabilization while relying on the mobility resilience of graph alliances. In this paper, we propose a fully distributed and self-stabilizing clustering algorithm for key management in MANETs where each cluster is an alliance.
Similar content being viewed by others
References
Augot D, Bhaskar R, Issarny V, Sacchetti D (2007) A three round authenticated group key agreement protocol for ad hoc networks. Pervasive Mob Comput 3(1):36–52
Baker D, Ephremides A (1981) The architectural organization of a mobile radio network via a distributed algorithm. IEEE Trans Commun 29(11):1694–1701
Baker D, Ephremides A (1981) A distributed algorithm for organizing mobile radio telecommunication networks. In: 2nd International conference on distributed computer systems, pp 476–483
Bhaskar R, Augot D, Issarny V, Sacchetti D (2005) An efficient group key agreement protocol for ad hoc networks. In: IEEE workshop on trust, security and privacy in ubiquitous computing, Taormina, Italy, 12–16 June
Bresson E, Chevassut O, Pointcheval D (2002) Dynamic group Diffie Hellman key exchange under standard assumptions. In: Advances in cryptology—EUROCRYPT ’02. LNCS, vol 2332. Springer, Berlin, pp 321–326
Cho JH, Chen IR, Wang DC (2008) Performance optimization of region-based group key management in mobile ad hoc networks. Perform Eval 65:319–344
Desmedt YG (1994) Threshold cryptography. Eur Trans Telecommun 5(4):449–457
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory IT–22(6):644–654
Dijkstra EW (1974) Self-stabilizing systems in spite of distributed control. Commun ACM 17(11):643–644
Dolev S (2000) Self-stabilization. MIT Press, Cambridge
Douceur JR (2002) The sybil attack. In: Intl workshop on peer-to-peer systems
Drira K, Seba H, Kheddouci H (2010) Ecgk: an efficient clustering scheme for group key management in MANETs. Comput Commun 33:1094–1107
Hedetniemi SM, Hedetniemi ST, Kristiansen P (2004) Alliances in graphs. J Comb Math Comb Comput 48:157–177
http://www.isi.edu/nsnam/ns/ (2011)
Hu YC, Johnson DB, Perrig A (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Mobicom’02
Hu YC, Johnson DB, Perrig A (2002) Sead: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Fourth IEEE workshop on mobile computing systems and applications (WM-CSA’02), Jun
Karlof C, Wagner D (2003) Secure routing in wireless sensor networks:attacks and countermeasures. AdHoc Netw 1(2–3):293–315, Special Issue on Sensor Network Applications and Protocols
Kim Y, Perrig A, Tsudik G (2000) Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Seventh ACM conf computer and comm security, Nov, pp 235–244
Kim Y, Perrig A, Tsudik G (2004) Group key agreement efficient in communication. IEEE Trans Comput 53(7):905–921
Larson T, Hedman N (1998) Routing protocols in wireless ad-hoc networks: a simulation study. Master Thesis, Lulea University of Technology Stockholm
Li JH, Bhattacharjee B, Yu M, Levy R (2008) A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Future Gener Comput Syst 24:860–869
Li JH, Yu M, Levy R, Teittinen A (2006) A mobility resistant efficient clustering approach for ad hoc and sensor networks. Mob Comput Commun Rev 10(2):1–12
Li X, Slay J, Yu S (2005) Evaluating trust in mobile ad hoc networks. In: International conference on computational intelligence and security (CIS’2005) December
Liao L, Manulis M (2007) Tree-based group key agreement framework for mobile ad-hoc networks. Future Gener Comput Syst, 23(6):787–803
Mahapatra RP, IACSIT S, Katyal M (2010) Taxonomy of routing security for ad-hoc network. Int J Comput Theory Eng 2(2):1793–8201
Manulis M (2005) Contributory group key agreement protocols, revisited for mobile ad-hoc groups. In: 2nd IEEE international conference on mobile sensor systems, pp 811–818
Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Conference on communication and multimedia security (CMS)
Milanovic N, Malek M, Davidson A, Milutinovic V (2004) Routing and security in mobile ad hoc networks. IEEE Comput 37(2):61–65
Mittra S (1997) Iolus: a framework for scalable secure multicasting. In: ACM SIGCOMM, pp 277–288
Perrig A, Tygar JD, Song D, Canetti R (2000) Efficient authentication and signing of multicast streams over lossy channels. In: 2000 IEEE symposium on security and privacy
Piro C, Shields C, Levine BN (2006) Detecting the sybil attack in mobile ad hoc networks. In: Securecomm and workshops
Balachandran RK, Ramamurthy B, Xukai Z, Vinodchandran NV (2005) CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks. In: IEEE international conference on communications (ICC 2005), pp 1123–1127
Yi S, Moca RK (2003) Mobile certificate authority for wireless ad hoc networks. In: 2nd annual PKI research workshop (PKI 03)
Steiner M, Tsudik G, Waidner M (2000) Key agreement in dynamic peer groups. IEEE Trans Parallel Distrib Syst 11(8):769–779
Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad-hoc networks. J Sel Areas Commun Security Wirel Ad-Hoc Netw 24(2):318–328
Tseng Y, Yang C, Liao D (2007) A Secure Group Communication Protocol for Ad Hoc Wireless Networks. Advances in Wireless Ad Hoc and Sensor Networks. Signals and Communication Technology. Springer, Berlin
Xiang-Yang L, Wang Y, Frieder O (2002) Efficient hybrid key agreement protocol for wireless ad hoc networks. In: Proceedings of the Eleventh International Conference on Computer Communications and Networks
Hu YC, Johnson DB (2003) AP Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-second annual joint conference of the IEEE computer and communications societies. vol 3., pp 1976–1986
Younes O, Fahmy S (2004) HEED: a hybrid, energy-efficient distributed clustering approach for adhoc sensor networks. IEEE Trans Mob Comput 3(4):1–12
Zhu S, Setia S, Xu S, Jajodia S (2004) GKMPAN, an efficient group rekeying scheme for secure multicast in ad-hoc networks. In: MobiQuitous. IEEE Computer Society, Los Alamitos, pp 42–51
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Seba, H., Lagraa, S. & Kheddouci, H. Alliance-based clustering scheme for group key management in mobile ad hoc networks. J Supercomput 61, 481–501 (2012). https://doi.org/10.1007/s11227-011-0607-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-011-0607-3