Abstract
In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic multicast groups in wireless networks. In our protocol, a multicast group is defined only at the time of the multicasting. The authentication server (AS) in the network generates a session key and authenticates it to each of the members of a multicast group using the computationally inexpensive least common multiple (LCM) method. In addition, a pseudo random function (PRF) is used to bind the secret keys of the network members with their identities. By doing this, the AS is relieved from storing per member secrets in its memory, making the scheme completely storage scalable. The protocol minimizes the load on the network members by shifting the computational tasks towards the AS node as far as possible. The protocol possesses a membership revocation mechanism and is protected against replay attack and brute force attack. Analytical and simulation results confirm the effectiveness of the proposed protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: Issues and architectures. RFC 2627 (June 1999)
Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 459–474. Springer, Heidelberg (1999)
Abdel-Hafez, A., Miri, A., Orozco-Barbosa, L.: Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks. International Journal of Network Security 4(1), 90–98 (2007)
Balachandran, R.K., Ramamurthy, B., Zou, X., Vinodchandran, N.V.: CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks. In: 2005 IEEE International Conference on Communications, ICC 2005, vol. 2, pp. 1123–1127. IEEE (May 2005)
Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Trans. Networking 8, 16–31 (2000)
Srinivasan, R., Vaidehi, V., Rajaraman, R., Kanagaraj, S., Chidambaram Kalimuthu, R., Dharmaraj, R.: Secure Group Key Management Scheme for Multicast Networks. International Journal of Network Security 11(1), 30–34 (2010)
Ingemarsson, I., Tang, D.T., Wong, C.K.: A conference key distribution system. IEEE Transactions on Information Theory 28(5), 714–720 (1982)
Zou, X., Thukral, A., Ramamurthy, B.: An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds.) MSN 2006. LNCS, vol. 4325, pp. 509–520. Springer, Heidelberg (2006)
Dutta, R., Dowling, T.: Secure and Efficient Group Key Agreements for Cluster Based Networks. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science IV. LNCS, vol. 5430, pp. 87–116. Springer, Heidelberg (2009)
Teo, J.C.M., Tanu, C.H.: Energy-Efficient and Scalable Group Key Agreement for Large Ad Hoc Networks. In: PE-WASUN 2005, Montreal, Quebec, Canada, October 10-13 (2005)
Zheng, X., Huang, C.-T., Matthews, M.: Chinese remainder theorem based group key management. In: Proceedings of the 45th Annual Southeast Regional Conference, March 23-24. ACM (2007)
Konstantinou, E.: Cluster-based Group Key Agreement for Wireless Ad Hoc Networks. In: Proc. of the Third International Conference on Availability, Reliability and Security - ARES 2008, pp. 550–557. IEEE Press (2008)
Drira, K., Seba, H., Kheddouci, H.: ECGK: An efficient clustering scheme for group key management in MANETs. Computer Communications 33, 1094–1107 (2010)
Castalia: A simulator for Wireless Sensor Networks and Body Area Networks, http://castalia.npc.nicta.com.au/pdfs/Castalia%20-%20User%20Manual.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jambhulkar, P.J., Maity, S., Hansdah, R.C. (2013). A Multicast Authentication Protocol (MAP) for Dynamic Multicast Groups in Wireless Networks. In: Thampi, S.M., Atrey, P.K., Fan, CI., Perez, G.M. (eds) Security in Computing and Communications. SSCC 2013. Communications in Computer and Information Science, vol 377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40576-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-40576-1_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40575-4
Online ISBN: 978-3-642-40576-1
eBook Packages: Computer ScienceComputer Science (R0)