Light Weight Network Coding Based Key Distribution Scheme for MANETs

  • Jianwei Liu
  • Abdur Rashid Sangi
  • Ruiying Du
  • Qianhong Wu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)


We present a lightweight network coding based key distribution scheme to secure communications in mobile ad hoc network. Our scheme only needs simple XOR network coding operations and message authentication codes to achieve data confidentiality and guarantee the integrity of the distributed keys, respectively. Security analysis shows the effectiveness of our scheme against eavesdropping and impersonation attacks as well as brute force attacks. The proposed scheme employs a cluster-based hierarchical network topology. Simulation analysis show that for key exchange between two nodes in the same cluster, the scheme achieves more than 95% key delivery ratio with an ignorable average delay of 2 m.s.; for key exchange between nodes in different clusters, 58% key delivery ratio is achieved with around 10 m.s. of average delay.


network coding key distribution scheme message authentication code (MAC) wireless ad hoc network network simulator-2 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ahlswede, R., Cai, N., Li, S.-Y.R., Yeung, R.W.: Network Information Flow. IEEE Transactions on Information Theory 46(4), 1204–1216 (2000)MathSciNetzbMATHCrossRefGoogle Scholar
  2. 2.
    Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System (Extended Abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  3. 3.
    Li, B., Garcia-Luna-Aceves, J.J.: Tology Management in Ad Hoc Networks. In: Proc. of MOBIHOC 2003, pp. 129–140. ACM (2003)Google Scholar
  4. 4.
    Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Dutta, R., Barua, R.: Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting. IEEE Transactions on Information Theory 54(5), 2007–2025 (2008)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Dong, J., Curtmola., S.R., Nita-Rotaru, C.: Toward Secure Network Coding in Wireless Networks: Threats and Challenges. In: Proc. of 4th Workshop on Secure Network Protocols (NPSEC 2008), pp. 33–38. IEEE (2008)Google Scholar
  7. 7.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)CrossRefGoogle Scholar
  8. 8.
    Gkantsidis, C., Rodriguez, P.: Network Coding for Large Scale Content Distribution. In: Proc. of INFOCOM 2005, pp. 2235–2245. IEEE (2005)Google Scholar
  9. 9.
    Gentry, C., Waters, B.: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171–188. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  10. 10.
    Huang, Y.-M., Yeh, C.-H., Wang, T.-I., Chao, H.-C.: Constructing Secure Group Communication over Wireless Ad Hoc Networks Based on a Virtual Subnet Model. IEEE Wireless Communications 14(5), 71–75 (2007)Google Scholar
  11. 11.
    Ingemarsson, I., Tang, D.T., Wong, C.K.: A Conference on Key Distribution System. IEEE Transactions on Information Theory 28(5), 714–720 (1982)MathSciNetzbMATHCrossRefGoogle Scholar
  12. 12.
    Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Médard, M.: Resilient Network Coding in the Presence of Byzantine Adversaries. In: Proc. of INFOCOM 2007, pp. 616–624. IEEE (2007)Google Scholar
  13. 13.
    Jiang, M., Li, J., Tay, Y.C.: Cluster Based Routing Protocol (CBRP): Functional Specification. In: Mobile Ad-hoc Network (MANET) Working Group, IETF (1998)Google Scholar
  14. 14.
    Liu, J., Du, R., Chen, J., He, K.: A Key Distribution Scheme Using Network Coding for Mobile Ad Hoc Network. Security and Communication Networks 5(1), 59–67 (2012)CrossRefGoogle Scholar
  15. 15.
    Lima, L., Vilela, J.P., Oliveira, P.F., Barros, J.: Network Coding Security: Attacks and Countermeasures. Cryptography and Security, CoRR abs/0809.1366 (2008),
  16. 16.
    Li, S., Yeung, R., Cai, N.: Linear Network Coding. IEEE Transactions on Information Theory 49(2), 371–381 (2003)MathSciNetzbMATHCrossRefGoogle Scholar
  17. 17.
    Mao, Y., Sun, Y., Wu, M., Liu, K.J.R.: JET: Dynamic Join-Exit-Tree Amortization and Scheduling for Contributory Key Management. IEEE/ACM Transactions on Networking 14(5), 1128–1140 (2006)CrossRefGoogle Scholar
  18. 18.
    Network Simulator-2 (2011),
  19. 19.
    Oliveira, P.F., Barros, J.: Mobile Secret Key Distribution with Network Coding. In: Proc. of the International Conference on Security and Cryptography (SECRYPT 2007), pp. 171–174 (2007)Google Scholar
  20. 20.
    Oliveira, F., Barros, J.: Network Coding Protocols for Secret Key Distribution. IEEE Transactions on Information Forensics and Security 3(3), 414–423 (2008)CrossRefGoogle Scholar
  21. 21.
    Rong, B., Chen, H.-H., Qian, Y., Lu, K., Hu, R.Q., Guizani, S.: A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study. IEEE Transactions on Vehicular Technology 58(1), 398–408 (2009)CrossRefGoogle Scholar
  22. 22.
    Sangi, A.R.: Route Information Poisoning in MANETs: Analysis and Defenses. In: Proc. of Fourth IITA Conference (2010)Google Scholar
  23. 23.
    Sangi, A.R., Liu, J., Liu, Z.: Performance Comparison of Single and Multi-Path routing Protocol in MANET with Selfish Behaviors. Proc. of World Academy of Science, Engineering and Technology (WASET) 65, 828–832 (2010)Google Scholar
  24. 24.
    Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel Distributed System 11(8), 769–780 (2000)CrossRefGoogle Scholar
  25. 25.
    Vilela, J.P., Lima, L., Barros, J.: Lightweight Security for Network Coding. In: Proc. of ICC 2008, pp. 1750–1754. IEEE (2008)Google Scholar
  26. 26.
    Viega, J., Messier, M., Chandra, P.: Network Security with OpenSSL, 1st edn. O’Reilly, Cambridge (2002)Google Scholar
  27. 27.
    Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Xiao, Y., Shen, X., Du, D.-Z. (eds.) Wireless/Mobile Network Security, pp. 103–135. Springer (2006)Google Scholar
  28. 28.
    Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric Group Key Agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153–170. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  29. 29.
    Wu, Q., Qin, B., Zhan, L., Domingo-Ferrer, J.: Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm. IEEE/ACM Transactions on Networking (2012) ISSN : 1063-6692, doi:10.1109/TNET.2012.2208201Google Scholar
  30. 30.
    Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farràs, O.: Bridging Broadcast Encryption and Group Key Agreement. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 143–160. Springer, Heidelberg (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Jianwei Liu
    • 1
  • Abdur Rashid Sangi
    • 1
  • Ruiying Du
    • 2
  • Qianhong Wu
    • 1
    • 2
    • 3
  1. 1.School of Electronics and Information EngineeringBeihang UniversityChina
  2. 2.School of Computer ScienceWuhan UniversityWuhanChina
  3. 3.Department of Computer Engineering and MathematicsUniversitat Rovira i VirgiliTarragonaCatalonia

Personalised recommendations