Abstract
Most of mobile ad hoc network (MANET) applications are based on the group communication and, because of the insecure characteristic of the wireless channel, multicast security is especially needed in MANET. Secure delivery of multicast data can be achieved with the use of a group key for data encryption. However, for the support of dynamic group membership, the group key has to be updated for each member join/leave and, consequently, a mechanism distributing an updated group key to members is required. The two major categories of the group key distribution mechanisms proposed for wired networks are the naive and the tree-based approaches. The naive approach is based on unicast, so it is not appropriate for large group communication environment. On the other hand, the tree-based approach is scalable in terms of the group size, but requires the reliable multicast mechanism for the group key distribution. In the sense that the reliable multicast mechanism requires a large amount of computing resources from mobile nodes, the tree-based approach is not that desirable for the small-sized MANET environment. However, recent studies on the secure multicast mechanism for MANET focus on the tree-based approach. Therefore, in this paper, we propose a new key distribution protocol, called the proxy-based key management protocol (PROMPT), which is based on the naive approach and reduces the message overhead of the naive by introducing the concept of the proxy node.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network, 24–30 (November 1999)
Perkins, C., Bolding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing, IETF RFC 3561 (July 2003)
Moyer, M.J., Rao, J.R., Rohatgi, P.: A Survey of Security Issues in Multicast Communications. IEEE Network, 12–23 (November 1999)
Wong, C.K., Gouda, M., Lam, S.S.: Secure Group Communication Using Key Graphs. In: Proceedings of ACM SIGCOMM (1998)
Lazos, L., Poovendran, R.: Energy-Aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information. In: IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP 2003), April 2003, vol. 4, pp. 201–204 (2003)
Moharrum, M., Mukkamala, R., Eltoweissy, M.: CKDS: An Efficient Combinatorial Key Distribution Scheme for Wireless Ad-Hoc Networks. In: IEEE International Conference on Performance, Computing, and Communications (IPCCC 2004), April 2004, pp. 631–636 (2004)
Zhu, S., Setia, S., Xu, S., Jajodia, S.: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. In: International Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS 2004), August 2004, pp. 42–51 (2004)
Chandra, R., Ramasubramanian, V., Birman, K.: Anonymouns Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks. In: 21st International Conference on Distributed Computing Systems (ICDCS), April 2001, pp. 275–283 (2001)
Gupta, S., Srimani, P.: An Adaptive Protocol for Reliable Multicast in Mobile Multi-hop Radio Networks. In: IEEE WMCSA 1999, February 1999, pp. 111–122 (1999)
Klos, L., Richard III, G.: Reliable Group Communication in an Ad Hoc Network. In: IEEE International Conference on Local Computer Networks, LCN 2002 (2002)
Sobeih, A., Baraka, H., Fahmy, A.: ReMHoc: A Reliable Multicast Protocol for Wireless Mobile Multihop Ad Hoc Networks. In: IEEE Consumer Communications and Networking Conference (CCNC) (January 2004)
Tang, K., Obraczka, K., Lee, S.-J., Gerla, M.: Reliable Adaptive Lightweight Multicast Protocol. In: IEEE ICC 2003 (May 2003)
Cormen, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to Algorithms. MIT Press, Cambridge (1990)
UCLA Computer Science Department Parallel Computing Laboratory and Wireless Adaptive Mobility Laboratory, GloMoSim: A Scalable Simulation Environment for Wireless and Wired Network Systems, http://pcl.cs.ucla.edu/projects/domains/glomosim.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lim, Y., Ahn, S. (2005). Improvement of the Naive Group Key Distribution Approach for Mobile Ad Hoc Networks. In: Jia, X., Wu, J., He, Y. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2005. Lecture Notes in Computer Science, vol 3794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599463_74
Download citation
DOI: https://doi.org/10.1007/11599463_74
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30856-0
Online ISBN: 978-3-540-32276-4
eBook Packages: Computer ScienceComputer Science (R0)