Secure and Efficient Group Key Agreements for Cluster Based Networks

  • Ratna Dutta
  • Tom Dowling
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5430)


Ad hoc wireless networks offer anytime-anywhere networking services for infrastructure-free communication over the shared wireless medium. The proliferation of portable devices and ad hoc networks have led to the need for security services. This is illustrated daily in the media with reports of wireless network vulnerabilities. In this setting, secure group key agreement and efficient group key management are considered challenging tasks from both an algorithmic and computational point of view due to resource constraint in wireless networks. In this article, we present two dynamically efficient authenticated group key agreement protocols by reflecting ad hoc networks in a topology composed by a set of clusters. We analyse the complexity of the schemes and differentiate between the two approaches based on performance in a wireless setting. The proposed protocols avoid the use of a trusted third party (TTP) or a central authority, eliminating a single point attack. They allow easy addition and removal of nodes, and achieve better performance in comparison with the existing cluster based key agreements. Additionally, our proposed schemes are supported by sound security analysis in formal security models under standard cryptographic assumptions.


clustering provable security wireless networks group key agreement and key management 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abdel-Hafez, A., Miri, A., Oronzo-Barbosa, L.: Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks. Int. Journal of Network Security 4(1), 90–98 (2007)Google Scholar
  2. 2.
    Baker, D.J., Ephremides, A.: The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm. IEEE Transactions on Communications, COM-29(11), 1694–1701 (1981)CrossRefGoogle Scholar
  3. 3.
    Baker, D.J., Ephremides, A., Flynn, J.A.: The Design and Simulation of a Mobile Radio Network with Distributed Control. IEEE Journal on Selected Areas in Communications, 226–237 (1984)Google Scholar
  4. 4.
    Belding-Royer, E.M.: Hierarchical Routing in Ad hoc Mobile Networks. Wireless Communication & Mobile Computing 2(5), 515–532 (2002)CrossRefGoogle Scholar
  5. 5.
    Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–368. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321–336. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  8. 8.
    Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  9. 9.
    Burmester, M., Desmedt, Y.: A Secure and Scalable Group Key Exchange System. Information Processing Letters 94(3), 137–143 (2005)MathSciNetCrossRefMATHGoogle Scholar
  10. 10.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transaction on Information Theory, IT-22 (6), 644–654 (1976)MathSciNetCrossRefMATHGoogle Scholar
  11. 11.
    Dutta, R., Barua, R., Sarkar, P.: Provably Secure Authenticated Tree Based Group Key Agreement. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 92–104. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Dutta, R., Barua, R.: Dynamic Group Key Agreement in Tree-based Setting. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 101–112. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  13. 13.
    Dutta, R., Barua, R.: Constant Round Dynamic Group Key Agreement. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 74–88. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  14. 14.
    Dutta, R., Barua, R.: Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting. IEEE Transactions on Information Theory 54(5), 2007–2025 (2008)MathSciNetCrossRefMATHGoogle Scholar
  15. 15.
    Dutta, R., Barua, R.: Overview of Key Agreement Protocols,
  16. 16.
    Galbraith, S., Harrison, K., Soldera, D.: Implementing the Tate Pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  17. 17.
    Gerla, M., Tsai, J.T.-C.: Multicluster, Mobile, Multimedia Radio Network. ACM Baltzer Journal of Wireless Networks 1(3), 255–265 (1995)CrossRefGoogle Scholar
  18. 18.
    Hietalahti, M.: Efficient Key Agreement for Ad Hoc Networks. Master’s Thesis, Helsinki University of Technology, Department of Computer Science and Engineering, Espoo, Finland (2001)Google Scholar
  19. 19.
    Hietalahti, M.: A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks. Electronic Notes in Theoretical Computer Science 192, 43–53 (2008)CrossRefMATHGoogle Scholar
  20. 20.
    Joux, A.: A One Round Protocol for Tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  21. 21.
    Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  22. 22.
    Kim, Y., Perrig, A., Tsudik, G.: Tree Based Group Key Agreement. ACM Transactions on Information and System Security 7(1), 60–96 (2004)CrossRefGoogle Scholar
  23. 23.
    Konstantinou, E.: Cluster-based Group Key Agreement for Wireless Ad Hoc Networks. In: Proc. of IEEE ARES 2008, pp. 550–557 (2008)Google Scholar
  24. 24.
    Li, X., Wang, Y., Frieder, O.: Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks. In: Proc. of IEEE International Conference on Computer Communications and Networks, pp. 404–409 (2002)Google Scholar
  25. 25.
    Lynn, B., Scott, M., Berreto, P.S.L.M., Lynn, H.Y.: Efficient Algorithms for Pairing-Based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–369. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  26. 26.
    Manulis, M.: Security-Focused Survey on Group Key Exchange Protocols,
  27. 27.
    Menezes, A., Van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)MATHGoogle Scholar
  28. 28.
    NIST. AES (December 2000),
  29. 29.
    National Bureau of Standards. Data Encryption Standard, U.S. Department of Commerce, FIPS pub. 46 (1977)Google Scholar
  30. 30.
    Pei, G., Gerla, M., Hong, X., Chiang, C.C.: A Wireless Hierarchical Routing Protocol with Group Mobility. In: Proc. of IEEE WCNC 1999, pp. 1538–1542 (1999)Google Scholar
  31. 31.
    Scott, M.: Computing the Tate Pairing. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 293–304. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  32. 32.
    Scott, M., Costigan, N., Abdulwahab, W.: Implementing Cryptographic Pairings on Smart Cards,
  33. 33.
    Sucec, J., Marsic, I.: Clustering Overhead for Hierarchical Routing in Mobile Adhoc Networks. In: Proc. of IEEE Infocomm 2002, pp. 1698–1706 (2002)Google Scholar
  34. 34.
    Shi, H., He, M., Qin, Z.: Authenticated and Communication Efficient Group Key Agreement for Clustered Ah Hoc Networks. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 73–89. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  35. 35.
    Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: Proc. of ACM CCS 1996, pp. 31–37. ACM Press, New York (1996)Google Scholar
  36. 36.
    Yao, G., Ren, K., Bao, F., Deng, R.H., Feng, D.: Making the Key Agreement Protocol in Mobile Ad Hoc Network More Efficient. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 343–356. Springer, Heidelberg (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Ratna Dutta
    • 1
  • Tom Dowling
    • 1
  1. 1.Claude Shannon Institute Computer Science DepartmentNUI Maynooth, Co.KildareIreland

Personalised recommendations