Skip to main content

Improvement of the Naive Group Key Distribution Approach for Mobile Ad Hoc Networks

  • Conference paper
Mobile Ad-hoc and Sensor Networks (MSN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3794))

Included in the following conference series:

  • 787 Accesses

Abstract

Most of mobile ad hoc network (MANET) applications are based on the group communication and, because of the insecure characteristic of the wireless channel, multicast security is especially needed in MANET. Secure delivery of multicast data can be achieved with the use of a group key for data encryption. However, for the support of dynamic group membership, the group key has to be updated for each member join/leave and, consequently, a mechanism distributing an updated group key to members is required. The two major categories of the group key distribution mechanisms proposed for wired networks are the naive and the tree-based approaches. The naive approach is based on unicast, so it is not appropriate for large group communication environment. On the other hand, the tree-based approach is scalable in terms of the group size, but requires the reliable multicast mechanism for the group key distribution. In the sense that the reliable multicast mechanism requires a large amount of computing resources from mobile nodes, the tree-based approach is not that desirable for the small-sized MANET environment. However, recent studies on the secure multicast mechanism for MANET focus on the tree-based approach. Therefore, in this paper, we propose a new key distribution protocol, called the proxy-based key management protocol (PROMPT), which is based on the naive approach and reduces the message overhead of the naive by introducing the concept of the proxy node.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network, 24–30 (November 1999)

    Google Scholar 

  2. Perkins, C., Bolding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing, IETF RFC 3561 (July 2003)

    Google Scholar 

  3. Moyer, M.J., Rao, J.R., Rohatgi, P.: A Survey of Security Issues in Multicast Communications. IEEE Network, 12–23 (November 1999)

    Google Scholar 

  4. Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communication Using Key Graphs. In: Proceedings of ACM SIGCOMM (1998)

    Google Scholar 

  5. Lazos, L., Poovendran, R.: Energy-Aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information. In: IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP 2003), April 2003, vol. 4, pp. 201–204 (2003)

    Google Scholar 

  6. Moharrum, M., Mukkamala, R., Eltoweissy, M.: CKDS: An Efficient Combinatorial Key Distribution Scheme for Wireless Ad-Hoc Networks. In: IEEE International Conference on Performance, Computing, and Communications (IPCCC 2004), April 2004, pp. 631–636 (2004)

    Google Scholar 

  7. Zhu, S., Setia, S., Xu, S., Jajodia, S.: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. In: International Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS 2004), August 2004, pp. 42–51 (2004)

    Google Scholar 

  8. Chandra, R., Ramasubramanian, V., Birman, K.: Anonymouns Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks. In: 21st International Conference on Distributed Computing Systems (ICDCS), April 2001, pp. 275–283 (2001)

    Google Scholar 

  9. Gupta, S., Srimani, P.: An Adaptive Protocol for Reliable Multicast in Mobile Multi-hop Radio Networks. In: IEEE WMCSA 1999, February 1999, pp. 111–122 (1999)

    Google Scholar 

  10. Klos, L., Richard III, G.: Reliable Group Communication in an Ad Hoc Network. In: IEEE International Conference on Local Computer Networks, LCN 2002 (2002)

    Google Scholar 

  11. Sobeih, A., Baraka, H., Fahmy, A.: ReMHoc: A Reliable Multicast Protocol for Wireless Mobile Multihop Ad Hoc Networks. In: IEEE Consumer Communications and Networking Conference (CCNC) (January 2004)

    Google Scholar 

  12. Tang, K., Obraczka, K., Lee, S.-J., Gerla, M.: Reliable Adaptive Lightweight Multicast Protocol. In: IEEE ICC 2003 (May 2003)

    Google Scholar 

  13. Cormen, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to Algorithms. MIT Press, Cambridge (1990)

    MATH  Google Scholar 

  14. UCLA Computer Science Department Parallel Computing Laboratory and Wireless Adaptive Mobility Laboratory, GloMoSim: A Scalable Simulation Environment for Wireless and Wired Network Systems, http://pcl.cs.ucla.edu/projects/domains/glomosim.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lim, Y., Ahn, S. (2005). Improvement of the Naive Group Key Distribution Approach for Mobile Ad Hoc Networks. In: Jia, X., Wu, J., He, Y. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2005. Lecture Notes in Computer Science, vol 3794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599463_74

Download citation

  • DOI: https://doi.org/10.1007/11599463_74

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30856-0

  • Online ISBN: 978-3-540-32276-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics