HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes

  • Attila Altay Yavuz
  • Fatih Alagoz
  • Emin Anarim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4263)


Mobile Ad-hoc networks (MANETs), providing infrastructure-free wireless instant communication, play important role in tactical military networks. However, providing security in tactical military MANETs, having very large and dynamic structure without infrastructure support in hostile environments, is a very difficult task. In order to address security problems in tactical military MANETs, we propose a new HIerarchical MUlti-Tier adaptive ad-hoc network security protocol based on SIgncryption type key exchange Schemes: HIMUTSIS. Our protocol makes contribution to the military MANETs in three major points: Architectural design, cryptographic methods used in military MANETs and key management techniques. Novel architectural design of HIMUTSIS facilitates certification and key management procedures, provides flexibility and reduces cryptographic workload of the military MANETs. In HIMUTSIS, as a novelty, we offer to use DKEUTS (Direct Key Exchange Using TimeStamp) protocol providing security and performance advantages when compared to some traditional cryptographic methods. Also, multi-security level approach provides adaptive solutions for each layer of the HIMUTSIS. As a key management technique, HIMUTSIS uses hybrid key management approach which reduces rekeying workload of the networks significantly while minimizing single point of failure risk of the military MANET.


Security Level Block Cipher Stream Cipher Trust Third Party Cryptographic Hash Function 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Gu, D.L., Pei, G., Ly, H., Gerla, M., Hong, X.: Hierarchical Routing for Multi-layer Ad-hoc Wireless Networks with UAVs. In: IEEE MILCOM (2000)Google Scholar
  2. 2.
    Kong, J., Luo, H., Xu, K., Lihui Gu, D., Gerla, M., Lu, S.: Adaptive Security for Multi-layer Ad Hoc Networks. Wireless Communications and Mobile Computing, Special Issue on Mobile Ad Hoc Networking 2, 533–547 (2002)Google Scholar
  3. 3.
    Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. Computer Communications 23(18), 1627–1637 (2000)CrossRefGoogle Scholar
  4. 4.
    Zhou, L., Hass, Z.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)CrossRefGoogle Scholar
  5. 5.
    Zheng, Y.: Shortened digital signature, signcryption, and compact and unforgeable key agreement schemes (A contribution to IEEE P1363 Standard for Public Key Cryptography) (July 1998)Google Scholar
  6. 6.
    Altay Yavuz, A., Alagoz, F., Anarim, E.: A new satellite multicast security protocol based on elliptic curve signatures. In: IEEE International Conference on Information Communication Technologies (ICTTA) (April 2006)Google Scholar
  7. 7.
    Altay Yavuz, A., Alagoz, F., Anarim, E.: Three-Tiers satellite multicast security protocol based on ECMQV and IMC methods. In: Computer-Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD 2006) (2006)Google Scholar
  8. 8.
    Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Groups. In: Proc. 3rd ACM Symp. on Computer and Communications Security, March 1996, vol. 1, pp. 31–37 (1996)Google Scholar
  9. 9.
    Yao, G., Ren, K., Bao, F., Deng, R., Feng, D.: Making the Key Agreement Protocol in Mobile Ad Hoc Network More Efficient. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 343–356. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Augot, D., Bhaskar, R., Issarny, V., Sacchetti, D.: An Efficient Group Key Agreement Protocol for Ad hoc Networks. In: IEEE Workshop on Trust, Security and Privacy in Ubiquitous Computing, Taormina, Italy (2005)Google Scholar
  11. 11.
    Rafaeli, D.H.S.: A survey of key management for secure group communications. ACM Comp. Surveys 35(3), 309–329 (2003)CrossRefGoogle Scholar
  12. 12.
    Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)CrossRefGoogle Scholar
  13. 13.
    Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. IETF, RFC2627 (June 1999)Google Scholar
  14. 14.
    Balenson, D., et al.: Key management for large dynamic groups: One way function trees and amortized initialization. IETF Draft, work-in progress, draft-balenson-groupkeymgmt-oft-00.txt (February 1999)Google Scholar
  15. 15.
    Perrig, A., Song, D., Tygar, J.D.: ELK, a new protocol for efficient large-group key distribution. In: IEEE Security and Privacy Symposium (May 2001)Google Scholar
  16. 16.
    Mittra, S.: Iolus: A framework for scalable secure multicasting. In: Proceedings of the ACM SIGCOMM 1997 (September 1997)Google Scholar
  17. 17.
    Altay Yavuz, A., Alagoz, F., Anarim, E.: NAMEPS: N -Tier Satellite Multicast Security Protocol Based on Signcryption Schemes. In: IEEE Globecom Conference, San Francisco (to appear, 2006)Google Scholar
  18. 18.
    Rhee, Y.P., Tsudik, G.: A group key management architecture in mobile ad-hoc wireless networks. Journal Of Communication and Networks 6(2), 156–162 (2004)Google Scholar
  19. 19.
    Gu, D.L., Pei, G., Ly, H., Gerla, M., Zhang, B., Hong, X.: UAV-aided Intelligent Routing for Ad-hoc Wireless Network in Single-area Theater. In: IEEE WCNC, pp. 1220–1225 (2000)Google Scholar
  20. 20.
    Zheng, Y.: Digital signcryption or how to achieve Cost(Signature Encryption) < < Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)Google Scholar
  21. 21.
    Zheng, Y., Imai, H.: Compact and unforgeable key establishment over an ATM network. In: Proceedings of IEEE INFOCOM 1998, pp. 411–418, 29/3–3/4 (1998)Google Scholar
  22. 22.
    Stinson, D.: Cryptography Theory and Practice, 3rd edn. CRC Press, Boca Raton (2005)Google Scholar
  23. 23.
    Anashin, V., Bogdanov, A., Kizhvatov, I.: ABC: A New Flexible Stream CipherGoogle Scholar
  24. 24.
    Altay Yavuz, A.: Novel Methods for Security Mechanisms and Key Management Techniques in Wireless Networks Based on Signcryption and Hybrid Cryptography. MS Thesis, Boğaziçi University (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Attila Altay Yavuz
    • 1
  • Fatih Alagoz
    • 1
  • Emin Anarim
    • 2
  1. 1.Department of Computer EngineeringBogazici UniversityIstanbulTurkey
  2. 2.Department of Electrical and Electronic EngineeringBogazici UniversityIstanbulTurkey

Personalised recommendations