Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient

  • Gang Yao
  • Kui Ren
  • Feng Bao
  • Robert H. Deng
  • Dengguo Feng
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2846)

Abstract

Mobile ad hoc networks offer convenient infrastructureless communications over the shared wireless channel. However, the nature of mobile ad hoc networks makes them vulnerable to security attacks, such as passive eavesdropping over the wireless channel and denial of service attacks by malicious nodes. To ensure the security, several cryptography protocols are implemented. Due to the resource scarcity in mobile ad hoc networks, the protocols must be communication efficient and need as less computational power as possible. Broadcast communication is an important operation for many application in mobile ad hoc networks. To securely broadcast a message, all the members in the network need share a group key so that they can use efficient symmetric encryption, such as DES and AES. Several group key management protocols have been proposed. However, not all of them are communication efficient when applied to mobile ad hoc networks. In this paper, we propose a hierarchical key agreement protocol that is communication efficient to mobile ad hoc networks. We also show how to manage the group efficiently in a mobile environment.

Keywords

Mobile ad hoc networks key agreement hierarchical security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Asokan, N., Ginzboorg, P.: Key-Agreement in Ad-hoc Networks. Computer Communications 23(17), 1627–1637 (2000)CrossRefGoogle Scholar
  2. 2.
    Ateniese, G., Steiner, M., Tsudik, G.: Authenticated group key agreement and friends. In: ACM Conference on Computer and Communications Security — CCS 1998, pp. 17–26 (1998)Google Scholar
  3. 3.
    Alzoubi, K., Wan, P.-J., Frieder, O.: Message-optimal connected-dominating-set construction for routing in mobile ad hoc networks. In: ACM International Symposium on Mobile Ad Hoc Networking and Computing — MobiHoc 2002 (2002)Google Scholar
  4. 4.
    Burmester, M.: On the risk of opening distributed keys. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 308–317. Springer, Heidelberg (1994)Google Scholar
  5. 5.
    Desmedt, Y., Burmester, M.: Towards practical proven secure authenticated key distribution. In: ACM Conference on Computer and Communications Security — CCS 1993, pp. 228–231 (1993)Google Scholar
  6. 6.
    Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  7. 7.
    Becker, K., Wille, U.: Communication complexity of group key distribution. In: ACM Conference on Computer and Communications Security — CCS 1998, pp. 1–6 (1998)Google Scholar
  8. 8.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)CrossRefMathSciNetGoogle Scholar
  9. 9.
    Gerla, M., Tsai, J.T.: Multicluster, mobile, multimedia radio network. ACMBaltzer Journal of Wireless Networks 1(3), 255–265 (1995)CrossRefGoogle Scholar
  10. 10.
    Hong, X., Xu, K., Gerla, M.: Scalable routing protocols for mobile ad hoc networks. IEEE Network 16(4), 11–21 (2002)CrossRefGoogle Scholar
  11. 11.
    Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. Cryptology ePrint Archive, Report 2002/009 (2002)Google Scholar
  12. 12.
    Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-Tolerant Key Agreement For Dynamic Collaborative Groups. In: 7th ACM Conference on Computer and Communications Security, pp. 235–244 (2000)Google Scholar
  13. 13.
    Lin, C.R., Gerla, M.: Adaptive clustering for mobile networks. IEEE Journal on Selected Areas in Communications 15(7), 1265–1275 (1997)CrossRefGoogle Scholar
  14. 14.
    Li, X., Wang, Y., Frieder, O.: Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks. In: IEEE International Conference on Computer Communications and Networks — ICCCN 2002 (2002)Google Scholar
  15. 15.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefGoogle Scholar
  16. 16.
    Pei, G., Gerla, M., Hong, X., Chiang, C.-C.: A wireless hierarchical routing protocol with group mobility. In: IEEE Wireless Communications and Networking Conference — WCNC 1999 (1999)Google Scholar
  17. 17.
    Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: ACM Conference on Computer and Communications Security — CCS 1996, pp. 31–37 (1996)Google Scholar
  18. 18.
    Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: A new approach to group key agreement. In: International Conference on Distributed Computing Systems — 1998, pp. 380–387 (1998)Google Scholar
  19. 19.
    Wan, P.-J., Alzoubi, K.M., Frieder, O.: Distributed construction of connected dominating set in wireless ad hoc networks. In: Annual Joint Conference of the IEEE Computer and Communications Societies — INFOCOM 2002 (2002)Google Scholar
  20. 20.
    Wang, Y., Li, X.: Geometric spanners for wireless ad hoc networks. In: IEEE International Conference on Distributed Computing Systems — ICDCS 2002 (2002)Google Scholar
  21. 21.
    Xu, K., Hong, X., Gerla, M.: An ad hoc network with mobile backbones. In: IEEE International Conference on Communications — ICC 2002 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Gang Yao
    • 1
    • 2
  • Kui Ren
    • 1
  • Feng Bao
    • 1
  • Robert H. Deng
    • 1
  • Dengguo Feng
    • 2
  1. 1.InfoComm Security Department, Institute of InfoComm ResearchSingapore
  2. 2.The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of SciencesBeijingP.R.China

Personalised recommendations