An Authenticated Transitive-Closure Scheme for Secure Group Communication in MANETS
It is essential to provide authentication on mobile nodes in group communication to ensure security and privacy. The nodes that are interested in participating in the group communication form Graphs (V, E). In this paper we authenticate the mobile nodes through transitive closure property of the graph in the routing phase of the On Demand Multicast Routing Protocol (ODMRP) that forms Transitive closure graph. We also performed collaborative group key generation with the nodes defined in the transitive closure graph to accomplish secure communication among the group members. Due to the dynamic nature of nodes in the group, we propose the join and leave algorithm. The rekeying is performed at every change that happens in the (Transitive Closure Graph) TCG. The performance analysis is done by simulation with various protocols with respect to the time taken to joining or leaving the group, time taken for group key generation, rekeying the nodes with respect to renewal of nodes in the group. The proposed system shows our protocol reduces the computational and communicational cost of secure group communication.
KeywordsOn demand Multicast Routing Protocol Group Communications Authenticated Transitive-Closure Scheme ATCS Group Key Generation Rekeying
Unable to display preview. Download preview PDF.
- 1.Royer, E.M., Perkins, C.E.: Multicast Operation of the Ad-hoc On-Demand Distance Vector Routing Protocol. In: Proc. of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), pp. 207–218 (August 1999)Google Scholar
- 2.Jetcheva, J.G., Johnson, D.B.: Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks. In: Proc.of the 2nd ACM International Symposium on Mobile and Ad-hoc Networking & Computing (MobiHOC), pp. 33–44 (October 2001)Google Scholar
- 3.Lee, S.-J., Gerla, M., Chiang, C.-C.: On-Demand Multicast Routing Protocol. In: Proc. of the Wireless Communications and Networking Conference (WCNC), pp. 1298–1302 (September 1999)Google Scholar
- 5.Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group Communication. In: SIGSAC Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, pp. 31–37 (1996)Google Scholar
- 6.Perrig, A.: Efficient collaborative key management protocols for secure autonomous group communication. In: Proceedings of the International Workshop on Cryptographic Techniques and E- Commerce (CrypTEC 1999), Hongkong, pp. 192–202 (July 1999)Google Scholar
- 8.Harn, L., Lin, C.: Authenticated Group Key Transfer Protocol Based on Secret Sharing. IEEE Trans. on Computers 59(6) (June 2010)Google Scholar
- 9.Wei, C.-Y.: A Hybrid Group Key Management Architecture for Heterogeneous MANET, pp. 565–570. IEEE Computer Society (2010)Google Scholar
- 10.Chauhan, K.K., Tapaswe, S.: A Secure Key Management System in Group Structured Mobile Ad hoc Networks. IEEE Trans. on Computers, 307–311 (2010)Google Scholar
- 11.Maheshwari, B.: Secure Key Agreement and Authentication Protocols. International Journal of Computer Science & Engineering Survey (IJCSES) 3(1) (February 2012)Google Scholar
- 12.Kamal, A.A.: Cryptanalysis of a Polynomial-based Key Management Scheme for Secure Group Communication. International Journal of Network Security 15(1), 59–61 (2013)Google Scholar
- 13.Liu, Y., Cheng, C., Cao, J., Jiang, T.: An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing. IEEE Trans. on Computers (2013)Google Scholar