Abstract
Securing multicast communications in ad hoc networks must consider several challenging factors such as high nodes mobility, limited bandwidth and constrained energy. Moreover, the establishment of a key management protocol within ad hoc environments meets the “1 affects n” problem, which is more critical in such type of networks, due to the high dynamicity of groups.
In this paper, we present an efficient clustering scheme for multicast key distribution in Mobile ad hoc networks. This scheme divides the multicast group into clusters, according to the localization of the group members and their mobility. Simulations indicate a valuable reduction in the average latency of keys distribution and a promising reduction in energy consumption. Analysis also shows that our scheme is scalable.
Chapter PDF
Similar content being viewed by others
References
Bettahar, H., Bouabdallah, A., Challal, Y.: An adaptive key management protocol for secure multicast. In: 11th International Conference on Computer Communications and Networks ICCCN, Florida, USA (October 2002)
Bouassida, M.S., Chrisment, I., Festor, O.: An Enhanced Hybrid Key Management Protocol for Secure Multicast in Ad Hoc Networks. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol. 3042, pp. 725–742. Springer, Heidelberg (2004)
Bouassida, M.S., Lahmadi, A., Chrisment, I., Festor, O.: Diffusion multicast séecurisée dans un environnement ad-hoc (1 vers n séquentiel). In: Rapport de recherche, INRIA (September 2004)
Challal, Y., Bettahar, H., Bouabdallah, A.: SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications. ACM SIGCOMM Computer Communications Review 34(2) (April 2004)
Dondeti, L., Mukherjee, S., Samal, A.: Secure one-to-many group communication sing dual encryption. Comput. Com-mun. 23(17), 1681–1701 (1999)
Jones, B., Skellern, D.: Hiperlan channel assignment strategies. Electronics Letters (1997)
Lazos, L., Poovendram, R.: Energy-Aware Secure Multicast Communication in Ad Hoc Networks Using Geographical Location Information. In: IEEE International Conference on Acoustics Speech and Signal Processing (2003)
Mittra, S.: Iolus: A framework for scalable secure multicasting. In: SIGCOMM, pp. 277–288 (1997)
Royer, E., Perkins, C.: Multicast Ad hoc On-Demand Distance Vector (MAODV) routing. IETF Internet Draft: draft-ietf-manet-maodv-00.txt (2000)
Sadowsky, J., Kafedziski, V.: On the Correlation and Scattering Functions of the WSSUS Channel for Mobile Communications. IEEE Transactions On Vehicular Technology 47(1) (February 1998)
Sun, Y., Trappe, W., Liu, K.: A Scalable Multicast Key Management Scheme for Heterogeneous Wireless Networks. IEEE/ACM Transactions on Networking 12(4), 653–666 (2004)
Wieselthier, J.E., Nguyen, G.D., Ephremides, A.: On the Construction of Energy-Efficient Broadcast and Multicast Trees in Wireless Networks. In: INFOCOM 2000, Tel-Aviv, Israel, March 26–30 (2000)
Wieselthier, J.E., Nguyen, G.D., Ephremides, A.: Algorithms for energy-efficient multicasting in static ad hoc wireless networks. Mobile Networks and Applications 6(3), 251–263 (2001)
Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. Technical report, University of Texas at Austin (1997)
Zhu, Y., Kunz, T.: Maodv implementation for ns-2.26 - systems and computing engineering, carleton university, technical report sce-04-01 (January 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bouassida, M.S., Chrisment, I., Festor, O. (2005). Efficient Clustering for Multicast Key Distribution in MANETs. In: Boutaba, R., Almeroth, K., Puigjaner, R., Shen, S., Black, J.P. (eds) NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems. NETWORKING 2005. Lecture Notes in Computer Science, vol 3462. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11422778_12
Download citation
DOI: https://doi.org/10.1007/11422778_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25809-4
Online ISBN: 978-3-540-32017-3
eBook Packages: Computer ScienceComputer Science (R0)