Abstract
Mobile ad hoc networks offer convenient infrastructureless communications over the shared wireless channel. However, the nature of mobile ad hoc networks makes them vulnerable to security attacks, such as passive eavesdropping over the wireless channel and denial of service attacks by malicious nodes. To ensure the security, several cryptography protocols are implemented. Due to the resource scarcity in mobile ad hoc networks, the protocols must be communication efficient and need as less computational power as possible. Broadcast communication is an important operation for many application in mobile ad hoc networks. To securely broadcast a message, all the members in the network need share a group key so that they can use efficient symmetric encryption, such as DES and AES. Several group key management protocols have been proposed. However, not all of them are communication efficient when applied to mobile ad hoc networks. In this paper, we propose a hierarchical key agreement protocol that is communication efficient to mobile ad hoc networks. We also show how to manage the group efficiently in a mobile environment.
Chapter PDF
Similar content being viewed by others
References
Asokan, N., Ginzboorg, P.: Key-Agreement in Ad-hoc Networks. Computer Communications 23(17), 1627–1637 (2000)
Ateniese, G., Steiner, M., Tsudik, G.: Authenticated group key agreement and friends. In: ACM Conference on Computer and Communications Security — CCS 1998, pp. 17–26 (1998)
Alzoubi, K., Wan, P.-J., Frieder, O.: Message-optimal connected-dominating-set construction for routing in mobile ad hoc networks. In: ACM International Symposium on Mobile Ad Hoc Networking and Computing — MobiHoc 2002 (2002)
Burmester, M.: On the risk of opening distributed keys. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 308–317. Springer, Heidelberg (1994)
Desmedt, Y., Burmester, M.: Towards practical proven secure authenticated key distribution. In: ACM Conference on Computer and Communications Security — CCS 1993, pp. 228–231 (1993)
Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Becker, K., Wille, U.: Communication complexity of group key distribution. In: ACM Conference on Computer and Communications Security — CCS 1998, pp. 1–6 (1998)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
Gerla, M., Tsai, J.T.: Multicluster, mobile, multimedia radio network. ACMBaltzer Journal of Wireless Networks 1(3), 255–265 (1995)
Hong, X., Xu, K., Gerla, M.: Scalable routing protocols for mobile ad hoc networks. IEEE Network 16(4), 11–21 (2002)
Kim, Y., Perrig, A., Tsudik, G.: Tree-based group key agreement. Cryptology ePrint Archive, Report 2002/009 (2002)
Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-Tolerant Key Agreement For Dynamic Collaborative Groups. In: 7th ACM Conference on Computer and Communications Security, pp. 235–244 (2000)
Lin, C.R., Gerla, M.: Adaptive clustering for mobile networks. IEEE Journal on Selected Areas in Communications 15(7), 1265–1275 (1997)
Li, X., Wang, Y., Frieder, O.: Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks. In: IEEE International Conference on Computer Communications and Networks — ICCCN 2002 (2002)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Pei, G., Gerla, M., Hong, X., Chiang, C.-C.: A wireless hierarchical routing protocol with group mobility. In: IEEE Wireless Communications and Networking Conference — WCNC 1999 (1999)
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: ACM Conference on Computer and Communications Security — CCS 1996, pp. 31–37 (1996)
Steiner, M., Tsudik, G., Waidner, M.: CLIQUES: A new approach to group key agreement. In: International Conference on Distributed Computing Systems — 1998, pp. 380–387 (1998)
Wan, P.-J., Alzoubi, K.M., Frieder, O.: Distributed construction of connected dominating set in wireless ad hoc networks. In: Annual Joint Conference of the IEEE Computer and Communications Societies — INFOCOM 2002 (2002)
Wang, Y., Li, X.: Geometric spanners for wireless ad hoc networks. In: IEEE International Conference on Distributed Computing Systems — ICDCS 2002 (2002)
Xu, K., Hong, X., Gerla, M.: An ad hoc network with mobile backbones. In: IEEE International Conference on Communications — ICC 2002 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yao, G., Ren, K., Bao, F., Deng, R.H., Feng, D. (2003). Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. In: Zhou, J., Yung, M., Han, Y. (eds) Applied Cryptography and Network Security. ACNS 2003. Lecture Notes in Computer Science, vol 2846. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45203-4_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-45203-4_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20208-0
Online ISBN: 978-3-540-45203-4
eBook Packages: Springer Book Archive