An Authenticated Transitive-Closure Scheme for Secure Group Communication in MANETS

  • B. Gopalakrishnan
  • A. Shanmugam
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8284)


It is essential to provide authentication on mobile nodes in group communication to ensure security and privacy. The nodes that are interested in participating in the group communication form Graphs (V, E). In this paper we authenticate the mobile nodes through transitive closure property of the graph in the routing phase of the On Demand Multicast Routing Protocol (ODMRP) that forms Transitive closure graph. We also performed collaborative group key generation with the nodes defined in the transitive closure graph to accomplish secure communication among the group members. Due to the dynamic nature of nodes in the group, we propose the join and leave algorithm. The rekeying is performed at every change that happens in the (Transitive Closure Graph) TCG. The performance analysis is done by simulation with various protocols with respect to the time taken to joining or leaving the group, time taken for group key generation, rekeying the nodes with respect to renewal of nodes in the group. The proposed system shows our protocol reduces the computational and communicational cost of secure group communication.


On demand Multicast Routing Protocol Group Communications Authenticated Transitive-Closure Scheme ATCS Group Key Generation Rekeying 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Royer, E.M., Perkins, C.E.: Multicast Operation of the Ad-hoc On-Demand Distance Vector Routing Protocol. In: Proc. of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), pp. 207–218 (August 1999)Google Scholar
  2. 2.
    Jetcheva, J.G., Johnson, D.B.: Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks. In: Proc.of the 2nd ACM International Symposium on Mobile and Ad-hoc Networking & Computing (MobiHOC), pp. 33–44 (October 2001)Google Scholar
  3. 3.
    Lee, S.-J., Gerla, M., Chiang, C.-C.: On-Demand Multicast Routing Protocol. In: Proc. of the Wireless Communications and Networking Conference (WCNC), pp. 1298–1302 (September 1999)Google Scholar
  4. 4.
    Burmester, M., Desmedt, Y.G.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  5. 5.
    Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group Communication. In: SIGSAC Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, pp. 31–37 (1996)Google Scholar
  6. 6.
    Perrig, A.: Efficient collaborative key management protocols for secure autonomous group communication. In: Proceedings of the International Workshop on Cryptographic Techniques and E- Commerce (CrypTEC 1999), Hongkong, pp. 192–202 (July 1999)Google Scholar
  7. 7.
    Perrig, A., Tsudik, G.: Tree-Based Group Key Agreement. ACM Trans. on Information and System Security 7(1), 60–96 (2004)CrossRefGoogle Scholar
  8. 8.
    Harn, L., Lin, C.: Authenticated Group Key Transfer Protocol Based on Secret Sharing. IEEE Trans. on Computers 59(6) (June 2010)Google Scholar
  9. 9.
    Wei, C.-Y.: A Hybrid Group Key Management Architecture for Heterogeneous MANET, pp. 565–570. IEEE Computer Society (2010)Google Scholar
  10. 10.
    Chauhan, K.K., Tapaswe, S.: A Secure Key Management System in Group Structured Mobile Ad hoc Networks. IEEE Trans. on Computers, 307–311 (2010)Google Scholar
  11. 11.
    Maheshwari, B.: Secure Key Agreement and Authentication Protocols. International Journal of Computer Science & Engineering Survey (IJCSES) 3(1) (February 2012)Google Scholar
  12. 12.
    Kamal, A.A.: Cryptanalysis of a Polynomial-based Key Management Scheme for Secure Group Communication. International Journal of Network Security 15(1), 59–61 (2013)Google Scholar
  13. 13.
    Liu, Y., Cheng, C., Cao, J., Jiang, T.: An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing. IEEE Trans. on Computers (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2013

Authors and Affiliations

  • B. Gopalakrishnan
    • 1
  • A. Shanmugam
    • 1
  1. 1.Bannari Amman Institute of TechnologySathyamangalamIndia

Personalised recommendations