An Enhanced Grroup Key Managementt Scheme for MANET | ||||
Menoufia Journal of Electronic Engineering Research | ||||
Article 14, Volume 28, Issue 1, January 2019, Page 237-274 | ||||
Document Type: Original Article | ||||
DOI: 10.21608/mjeer.2019.62755 | ||||
View on SCiNiTO | ||||
Authors | ||||
Ola Younis* ; Salah Essa; Ayman El-Sayed | ||||
Dept. of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University | ||||
Abstract | ||||
The basic motivation behind this paper is to demonstrate a solution for a group key management. The real concern is to provide security issues in such framework, and how to deal with the cryptographic keys that are required. To design functional and adequate key management frameworks, it is important to recognize attributes of the mobile ad hoc network and why traditional key management frameworks can't be utilized. The purpose of the key management is to give secure ways to handle the cryptographic keying generation, distribution, and the key maintenance. In this paper, we propose an effective key management technique, called a Transition Key Management Scheme (TKMS), for a mobile ad hoc network that is based on nparties Diffie Hellman protocol. Using transient keys is to oversee temporally members who recently joined the network group. TKMS expects to minimize the key management overhead in the network because of highly dynamic sessions of membership comparing with the other techniques. | ||||
References | ||||
kit-text-size-adjust: auto; -webkit-te[1] B. Madhusudhanan, S. Chitra, and C. Rajan, "Mobility-based key management technique for multicast security in mobile ad hoc networks.," ScientificWorldJournal., vol. 2015, p. 801632, 2015. [2] K. Gomathi, B. Parvathavarthini, and C. Saravanakumar, "An Efficient Secure Group Communication in MANET Using Fuzzy Trust Based Clustering and Hierarchical Distributed Group Key Management," Wirel. Pers. Commun., vol. 94, no. 4, pp. 2149–2162, 2017. [3] O. Younis, S. Essa, and A. Elsayed, "A New Group Key Management Scheme for Mobile Adhoc Networks," in 2nd International Conference on Mathematics and Applications (ICMA18), 2018. [4] T. Singh, J. Singh, and S. Sharma, "Energy efficient secured routing protocol for MANETs," Wirel. Networks, vol. 23, no. 4, pp. 1001–1009, 2017. [5] V. Agrawal and H. Chauhan, "An Overview of security issues in Mobile Ad hoc Networks," Int. J. Comput. Eng. Sci., pp. 1–9, 2014. [6] S. Aluvala, K. Raja Sekhar, and D. Vodnala, "A novel technique for node authentication in mobile ad hoc networks," Perspect. Sci., vol. 8, pp. 680–682, 2016. [7] W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644–654, 1976. [8] S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Comput. Surv., vol. 35, no. 3, pp. 309–329, 2003. [9] H. Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks," IEEE Commun. Mag., vol. 40, no. 10, pp. 70–75, 2002. [10] L. Abusalah, a. Khokhar, and M. Guizani, "A survey of secure mobile Ad Hoc routing protocols," IEEE Commun. Surv. Tutorials, vol. 10, no. 4, pp. 78–93, 2008. [11] D. B. Johnsort, "Routing in Ad Hoc Networks of Mobile Hosts," Mob. Comput. Syst. Appl. 1994. WMCSA 1994. First Work., pp. 158–163, 1994. [12] V. Park and M. Corson, "A highly adaptive distributed routing algorithm for mobile wireless networks,"…Annu.Jt.Conf.IEEE…,pp.1405–1413, 1997. [13] S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," Proc. 6th Annu. Int. Conf. Mob. Comput. Netw. - MobiCom’00,pp.255–265, 2000. [14] J. J. Garcia-Luna-Aceves and M. Spohn, "Source-tree routing in wireless networks," Proceedings. Seventh Int. Conf. Netw. Protoc., pp. 273–282, 1999. [15] Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Commun. Surv. Tutorials, vol. 8, no. 2, pp. 2–23, 2006. [16] C. E. Perkins, E. M. Royer, and S. Das, "Ad-hoc on-demand distance vector routing," Proc. - WMCSA’992ndIEEE Work. Mob. Comput. Syst. Appl., pp. 90– 100, 1999. [17] M. G. Zapata, "Secure ad-hoc on-demand distance vector routing," ACM SIGMOBILE Mob. Comput. Commun. Rev., vol. 6, no. 3, p. 106, 2002. kit-text-stroke-width: 0px; "> [18] Y.-C. Hu and D. B. Johnson, "Securing quality-of-service route discovery in ondemand routing for ad hoc networks," Proc. 2nd ACM Work. Secure. ad hoc Sens. networks - SASN’04,p.106,2004. [19] X. Chen and J. Wu, "Multicasting techniques in mobile ad hoc networks," Handb. ad hoc Wireless. networks, pp. 25–40, 2003. [20] C. Science and S. Engineering, "Multicast routing protocols in MANETs," Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 2, no. 1, 2012. [21] L. Junhai, Y. Danxia, X. Liu, F. Mingyu, and A. Voyiatzis, "A Survey of Multicast Routing Protocols for Mobile Ad-Hoc Networks," J. Internet Eng., vol. 5, no. 1, pp. 331–344, 2012. [22] M. Steiner, G. Tsudik, and M. Waidner, "CLIQUES: A New Approach to Group Key Agreement," Proc. 18th {IEEE} Int. Conf. Distrib. Comput. Syst., pp. 380– 387, 1998. [23] M. Burmester and Y. Desmedt, "A Secure and Efficient Conference Key Distribution System," in Annual International Conference on the Theory and Applications of Cryptographic Techniques, 1994, pp. 275–286. [24] Y. Kim, A. Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," Proc. 7th ACM Conf. Comput. Commun. Secure. - CCS’00,pp.235–244, 2000. [25] D. G. Steer, L. Strawczynski, W. Diffie, and M. Wiener, "A secure audio teleconference system," in Advances in Cryptology --- CRYPTO, 1988, vol. 403, pp. 520–528. | ||||
Statistics Article View: 138 |
||||