An Enhanced Grroup Key Managementt Scheme for MANET

Document Type : Original Article

Authors

Dept. of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University

Abstract

The basic motivation behind this paper is to demonstrate a
solution for a group key management. The real concern is to
provide security issues in such framework, and how to deal with
the cryptographic keys that are required. To design functional and
adequate key management frameworks, it is important to
recognize attributes of the mobile ad hoc network and why
traditional key management frameworks can't be utilized. The
purpose of the key management is to give secure ways to handle
the cryptographic keying generation, distribution, and the key
maintenance. In this paper, we propose an effective key
management technique, called a Transition Key Management
Scheme (TKMS), for a mobile ad hoc network that is based on nparties
Diffie Hellman protocol. Using transient keys is to oversee
temporally members who recently joined the network group.
TKMS expects to minimize the key management overhead in the
network because of highly dynamic sessions of membership
comparing with the other techniques.

kit-text-size-adjust: auto; -webkit-te[1] B. Madhusudhanan, S. Chitra, and C. Rajan, "Mobility-based key management
technique for multicast security in mobile ad hoc networks.,"
ScientificWorldJournal., vol. 2015, p. 801632, 2015.
[2] K. Gomathi, B. Parvathavarthini, and C. Saravanakumar, "An Efficient Secure
Group Communication in MANET Using Fuzzy Trust Based Clustering and
Hierarchical Distributed Group Key Management," Wirel. Pers. Commun., vol.
94, no. 4, pp. 2149–2162, 2017.
[3] O. Younis, S. Essa, and A. Elsayed, "A New Group Key Management Scheme for
Mobile Adhoc Networks," in 2nd International Conference on Mathematics and
Applications (ICMA18), 2018.
[4] T. Singh, J. Singh, and S. Sharma, "Energy efficient secured routing protocol for
MANETs," Wirel. Networks, vol. 23, no. 4, pp. 1001–1009, 2017.
[5] V. Agrawal and H. Chauhan, "An Overview of security issues in Mobile Ad hoc
Networks," Int. J. Comput. Eng. Sci., pp. 1–9, 2014.
[6] S. Aluvala, K. Raja Sekhar, and D. Vodnala, "A novel technique for node
authentication in mobile ad hoc networks," Perspect. Sci., vol. 8, pp. 680–682,
2016.
[7] W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE Trans. Inf.
Theory, vol. 22, no. 6, pp. 644–654, 1976.
[8] S. Rafaeli and D. Hutchison, "A survey of key management for secure group
communication," ACM Comput. Surv., vol. 35, no. 3, pp. 309–329, 2003.
[9] H. Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc
networks," IEEE Commun. Mag., vol. 40, no. 10, pp. 70–75, 2002.
[10] L. Abusalah, a. Khokhar, and M. Guizani, "A survey of secure mobile Ad Hoc
routing protocols," IEEE Commun. Surv. Tutorials, vol. 10, no. 4, pp. 78–93,
2008.
[11] D. B. Johnsort, "Routing in Ad Hoc Networks of Mobile Hosts," Mob. Comput.
Syst. Appl. 1994. WMCSA 1994. First Work., pp. 158–163, 1994.
[12] V. Park and M. Corson, "A highly adaptive distributed routing algorithm for
mobile wireless networks,"‎…‎Annu.‎Jt.‎Conf.‎IEEE‎…,‎pp.‎1405–1413, 1997.
[13] S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in
mobile ad hoc networks," Proc. 6th Annu. Int. Conf. Mob. Comput. Netw. -
MobiCom‎’00,‎pp.‎255–265, 2000.
[14] J. J. Garcia-Luna-Aceves and M. Spohn, "Source-tree routing in wireless
networks," Proceedings. Seventh Int. Conf. Netw. Protoc., pp. 273–282, 1999.
[15] Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in
wireless sensor networks," IEEE Commun. Surv. Tutorials, vol. 8, no. 2, pp. 2–23,
2006.
[16] C. E. Perkins, E. M. Royer, and S. Das, "Ad-hoc on-demand distance vector
routing," Proc. - WMCSA’99‎2nd‎IEEE Work. Mob. Comput. Syst. Appl., pp. 90–
100, 1999.
[17] M. G. Zapata, "Secure ad-hoc on-demand distance vector routing," ACM
SIGMOBILE Mob. Comput. Commun. Rev., vol. 6, no. 3, p. 106, 2002.
kit-text-stroke-width: 0px; "> [18] Y.-C. Hu and D. B. Johnson, "Securing quality-of-service route discovery in ondemand routing for ad hoc networks," Proc. 2nd ACM Work. Secure. ad hoc Sens.
networks - SASN‎’04,‎p.‎106,‎2004.
[19] X. Chen and J. Wu, "Multicasting techniques in mobile ad hoc networks," Handb.
ad hoc Wireless. networks, pp. 25–40, 2003.
[20] C. Science and S. Engineering, "Multicast routing protocols in MANETs," Int. J.
Adv. Res. Comput. Sci. Softw. Eng., vol. 2, no. 1, 2012.
[21] L. Junhai, Y. Danxia, X. Liu, F. Mingyu, and A. Voyiatzis, "A Survey of Multicast
Routing Protocols for Mobile Ad-Hoc Networks," J. Internet Eng., vol. 5, no. 1, pp.
331–344, 2012.
[22] M. Steiner, G. Tsudik, and M. Waidner, "CLIQUES: A New Approach to Group
Key Agreement," Proc. 18th {IEEE} Int. Conf. Distrib. Comput. Syst., pp. 380–
387, 1998.
[23] M. Burmester and Y. Desmedt, "A Secure and Efficient Conference Key
Distribution System," in Annual International Conference on the Theory and
Applications of Cryptographic Techniques, 1994, pp. 275–286.
[24] Y. Kim, A. Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for
dynamic collaborative groups," Proc. 7th ACM Conf. Comput. Commun. Secure.
- CCS‎’00,‎pp.‎235–244, 2000. [25] D. G. Steer, L. Strawczynski, W. Diffie, and M. Wiener, "A secure audio
teleconference system," in Advances in Cryptology --- CRYPTO, 1988, vol. 403,
pp. 520–528.