Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015, International Journal of Innovative Research in Computer and Communication Engineering
Group key management is one of the basic building blocks in collaborative and group-oriented applications in Mobile Ad Hoc Networks (MANETs). Group key establishment involves creating and distributing a common secret for all group members. However, key management for a large and dynamic group is a difficult problem because of scalability and security. Dynamical changes in network’s topology causes feeble conviction relationship among the nodes in the network. In MANETs a mobile node operates as end terminal as well as an midway router. Therefore, a multi-hop situation occurs for communication in MANETs; where in between source and destination there may be one or more malicious nodes. In this paper, we proposed a key management scheme. We assume that MANETs is alienated into groups having a group leader in each group. Group leader has accountability of key management in its group. Proposed key management scheme is a decentralized method that does not need any Trusted Third Party (TTP...
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 2009
Due to the dynamic topology and non infrastructure, network participants cooperate with their neighbors to route packets. The lack of centralized services allows mobile ad hoc networks to be easily and swiftly deployed, but make it difficult to check others' identities on the other hand. Cryptographic tools have been introduced to secure group communications, such as Private and Public Key Infrastructure. The autonomous and distributed nature of mobile ad hoc network demands a decentralized authentication service, where Public Key Infrastructure is considered a better solution. Public Key Infrastructure can ensure both confidentiality and authenticity, but it is impractical to provide an online trusted third party as Certificate Authority (CA) for mobile ad hoc network. In this paper, we proposed a new key management protocol which utilizes certificate graphs and distributed Certificate Authorities. Certificate graph maintained by each user represents the trust among his neighbors, then the maximum clique of certificate graph is selected to be CAs. Based on the assumption that initial certificate graph building is secure [11], good users have more friends while bad ones have less, thus a reliable group can be constructed. The most trustful subset of these good users -the maximum clique -is elected as the governor of this group, which takes the responsibility of certificate authentication.
2016
As Mobile Ad-hoc NETwork (MANET) has dynamic infrastructure, poor physical security and shared physical medium, key management is a challenging task. MANET has not fixed structure and so it is of potential security concern because neighbor nodes cannot be trusted. All the group oriented application like video conferencing, software distribution within a group and interactive multi-party business session use the multicast transmission for efficient communication and to save network resources. In many multicast environment, new node can enter and current node can leave at any time and existing members must have to communicate securely using multicast key management for MANET. The much apt solution to provide these services like authentication, confidentiality, integrity and secure multicasting is the establishment of key management protocol. In this paper, we aim to evaluate an overview of different group key management techniques for MANET like Enhanced Optimized Multicast Cluster Tr...
International Journal of Security and Networks, 2009
Group key management is one of the basic building blocks in collaborative and group-oriented applications in Mobile Ad Hoc Networks (MANETs). Group key establishment involves creating and distributing a common secret for all group members. However, key management for a large and dynamic group is a difficult problem because of scalability and security. Modification of membership requires the group key to be refreshed to ensure backward and forward secrecy. In this paper, we propose a Simple and Efficient Group Key (SEGK) management scheme for MANETs. Group members compute the group key in a distributed manner.
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that is self-organized to form an arbitrary topology with the absence of fixed infrastructure or centralized administration .In such environment security has become a main concern to provide confidentiality, authentication, integrity, availability, access control, and non-repudiation. Key management is the main component in MANET security.This paper proposes an efficient and secure distributed group key management scheme. Where, nodes in the network are divided into clusters. Each cluster has a cluster head (CH) and cluster members. Cluster head is responsible for maintaining the group key. It also updates the group key whenever a member joins or leaves the cluster. There-keying process takes place within the cluster only. So the computation and communication cost will be reduced. Another level of security is considered between communicating parties belonging to different clusters.
2013
Mobile Adhoc networks (MANETs) is compendium of self-governing terminals, which basically interconnect and exchange information with each other and by establishing a multi-hop network for to maintain connectivity in a decentralized approach. In this research group key management approach is used, which further uses a symmetric group key for to communicate inside the cluster. Clusterhead is responsible for the generation of group key and is responsible for the communication of other nodes throughout a secure path which uses public key cryptography scheme. Encryption of messages is used for group keys to communicate inside the cluster and within the group for secure communication. In this research the results are shown through how to secure communication in MANETs through group key and clustering scheme minimizes the packet damages as compared to centralized approach. And also examine the system for proper authentication of public and private keys and evaluates the functioning of proposed methodology.
International Journal of Distributed and Parallel systems, 2012
Mobile Ad-hoc network is spontaneous and infrastructure less network, which consist of wireless mobile nodes. MANET is formed on-the-fly and also provides various operations like packet forwarding, routing, network management, communication, etc between mobile nodes. MANET is one of the types of wireless network, in which any mobile node can join the network and leave the network in dynamic period. Mobile ad-hoc network doesn't having centralized infrastructure and due to its basic characteristics this network is very vulnerable to attack. There are lots of trust models and routing protocol which are used in MANETs to achieve security. Different trust schemes are used to provide confidentiality, integrity and availability in mobile ad-hoc network to gain the secure environment. In this paper, we present the study on various kinds of key management schemes with their special features.
International Journal of Computer …, 2008
Ad hoc networks are characterized by multi-hop wireless connectivity and frequently changing network topology. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority, i.e. fixed infrastructure. With that view in mind, group key management plays an important building block of any secure group communication. The main contribution of this paper is a low complexity key management scheme that is suitable for fully self-organized ad-hoc networks. The protocol is also password authenticated, making it resilient against active attacks. Unlike other existing key agreement protocols, ours make no assumption about the structure of the underlying wireless network, making it suitable for "truly ad-hoc" networks. Finally, we will analyze our protocol to show the computation and communication burden on individual nodes for key establishment.
reconfigurable group key managementin MANETs. The proposed approach describes aboutthe simple and efficient group key (SERGK) managementfor region based MANETs. Group key establishment refersthat multiple parties want to create a shared secret to beused to exchange information securely. Without depending ona central trusted entity, two people who do notpreviouslyshareamutualsecretcancreateonebasedontheDHprotocol. The 2-party Diffie-Hellman (DH) protocol canbe prolonged to a generalized version of n-party DH.Research efforts have been put into the design of a groupkeymanagement scheme for the sake of scalability,reliability,and security. Furthermore, group key managementalso needs to address the security issue related tomembershipchanges. The modification of membershiprequires nourishmentofthegroupkey.Thiscanbedoneeitherbyperiodicrekeyingorupdatingrightaftermemberchange.Thechangeofgrou pkeyensuresbackwardandforward security.
2014
This paper proposes an efficient multicast group key management protocol in a decentralised group communication manner. This protocol is similar to IGKMP (Intra Domain Group Key Management Protocol) and Hydra but has some major differences. A large group is split into several small subgroups. All the host members of each subgroup are managed by the sub group manager and sub group managers are managed by the group manager. The whole network is arranged in a tree format control structure. In our protocol, any one of the sub group managers (SGM) generates the group key (GK) and distributes that to all other SGMs in that group. Two kinds of key i.e. member control key (MCK) and sub group member control key (SGMCK) are used to distribute the group key (GK) among SGMs and host members. The significant advantage of this scheme is that no centralized controller is used for key generation and key distribution thereby providing the ability to avoid the single point of failure. The security me...
MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination nodes directly or via the intermediate nodes. Nodes exchange packets with each other to allow the message to pass among both ends step by step. These packets are outside the wireless transmission range. It is for potential security concern because intermediate nodes cannot be trusted. With such feature ad-hoc networks are least attacked which influences performance of the network with its reliability. Secure communication in MANET is to be claimed by the reliability parameter of the key management strategy, which is capable for securing contents among the nodes. This survey presents the conceptual view for various key management techniques with their special features.
International Journal of Advanced Computer Science and Applications, 2014
The migration from wired network to wireless network has been a global trend in the past few decades because they provide anytime-anywhere networking services. The wireless networks are rapidly deployed in the future, secure wireless environment will be mandatory. As well, The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks,Mobile Ad hoc Networks (MANET) is one of the most important and unique applications. MANET is a collection of autonomous nodes or terminals which communicate with each other by forming a multihop radio network and maintaining connectivity in a decentralized manner. Due to the nature of unreliable wireless medium data transfer is a major problem in MANET and it lacks security and reliability of data. The most suitable solution to provide the expected level of security to these services is the provision of a key management protocol. A Key management is vital part of security. This issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult task in MANET. When a member leaves or joins the group, it needs to generate a new key to maintain forward and backward secrecy. In this paper, we propose a new group key management schemes namely a Hierarchical, Simple, Efficient and Scalable Group Key (HSESGK) based on clustering management scheme for MANETs and different other schemes are classified. Group members deduce the group key in a distributed manner.
Journal of Systems and Software, 2007
A mobile ad hoc network (MANET) is a kind of wireless communication infrastructure that does not have base stations or routers. Each node acts as a router and is responsible for dynamically discovering other nodes it can directly communicate with. However, when a message without encryption is sent out through a general tunnel, it may be maliciously attacked. In this paper, we propose a hierarchical key management scheme (HKMS) for secure group communications in MANETs. For the sake of security, we encrypt a packet twice. Due to the frequent changes of the topology of a MANET, we also discuss group maintenance in this paper. Finally, we conducted the security and performance analysis to compare the proposed scheme with Tseng's [25] and Steiner's [24] schemes.
2014
Ensuring security in Mobile Ad-hoc Network is a challenging issue Many emerging applications in mobile ad hoc networks involve group-oriented communication. In Mobile ad hoc network a mobile node operates as not only end terminal but also as an intermediate router. Therefore, a multi-hop scenario occurs for communication in network. Where there may be one or more malicious nodes in between source and destination. Establishing MANET security is entirely different from the traditional methods of providing network security. As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention Securing communications in resource constrained, infrastructure-less environments such as MANETs is very challenging. All cryptographic techniques will be not effective if the key management is weak. The purpose of rekeying management is to provide secure procedures for handling cryptographic keying materials. The tasks of key management include key generation, key distribution, and key maintenance. In MANETs, A number of key management schemes have been proposed for MANETs. In this paper, we proposea Centralize approach based rekeying management scheme with group management.
The modern developments in Mobile AdhocNETworks (MANETs) suffer from efficient and secure broadcasting of messages to a distant system. The main obstacles for the secured information transfer are restricted communication from the cluster/group nodes to the sender and unavailability of a trusted public/private key generation center. This paper proposes a technique that uses a combination of broadcast encryption technique and Cluster/Group key agreement to overcome the obstacles. Among the proposed techniques each member maintains one public/secret key pair, seeing that the remote sender broadcasts to the subgroup. Though the non-intended member conspire they will not extractinformation that boosts security of the message. The Cluster /Group size is independent of computation and communication overhead that decreases the delay. The proposed technique provides competent approach to add or delete members of a cluster and a flexible rekeying strategy. In case of conspiracy it provides security to the broadcasted data. Simulation results are given using NS2.
IOSR Journal of Computer Engineering, 2014
InMobile ad hoc networks (MANETs) security has become a primary requirements.Thecharacteristics capabilities of MANETsexposeboth challenges and opportunities in achieving key security goals,such as confidentiality,access control,authentication, availability, integrity, and nonrepudiation.Cryptographic techniques are widely used for secure communications in both TCP and UDPnetworks. Most cryptographic mechanisms, such as symmetric and asymmetric cryptography,often involve the use of cryptographic keys. However, all cryptographic techniques will beunsecure or inefficient if the key management is weak. Key management is also a central component inMANET security. The main purpose of key management is to provide secure methods for handlingcryptographic keying algorithm. The tasks of key management includes keys for generation, distribution and maintenance. Key maintenance includes the procedures for key storage, keyupdate, key revocation, etc. In MANETs, the computational load and complexityfor key management are strongly subject to restriction by the node's available resources and thedynamic nature of network topology. A number of key management schemes have beenproposed for MANETs. In this article, we present a survey of the research work on keymanagement in MANETs according to recent publications.
International Journal of Security and Its Applications, 2014
A mobile ad hoc network (MANET) is a kind of wireless communication system that doesn't have base stations or routers. The wireless connections can be a standard Wi-Fi connection or satellite, or another medium such as a cellular transmission. Specific applications like military or public emergency require secure group communication in ad hoc environments. Good Key management is very important to get protection in any communication system. This paper presents most problems of securing key management in ad hoc networks. It presents a survey of different types of key management protocols in wired networks and in ad hoc networks. It presents the most common kinds of attacks in ad hoc networks. A new efficient approach is proposed. It is based on dividing the members into clusters. This scheme assumes a maximum allowed number of members in each cluster. This reduces the required number of encryption and decryption operations for each join operation in the cluster. This is most suitable for Mobile Ad hoc Networks.
IEEE Wireless Communications, 2000
International Journal of Engineering & Technology
Mobile ad-hoc networks (MANETS) are infrastructure less networks and the topology of this network is always changing. The nodes can enter and leave the network at any time. These networks require a high security in communication, as its application demands so. Effective key management is the only technique, which can implement to secure the nodes in communication. In adhocnetworks there is no central controller or router such as in wired network. This will make this network more vulnerable to attack. The intruders can easily enter the net-work and can manipulate the contents easily. Traditional key management schemes will not fit for this type of networks. This article, discuss various key management schemes based on routing protocols in mobile ad-hoc network (MANET). It also analyses them in terms of the security and applicability.
Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06, 2006
We propose a fully distributed group key distribution protocol for ad hoc networks. The protocol uses a key predistribution step that is performed by each node independently and generates secure links between nodes in a neighbourhood. The key pre-distribution step also allows formation of an initiator group who will generate a session key that will be distributed to all nodes using the secure links between nodes obtained in key pre-distribution stage. We describe efficient protocols for join of new nodes and revocation of compromised nodes. We analyse the system by calculating probability of success of each operation. We evaluate security of the system against outside eavesdroppers and discuss its security against an adversary that corrupts the nodes of the network. Finally we compare our system with two competing systems and show its superior performance in some scenarios.
The unique characteristics and constraints of MANET have made the traditional approach to security inadequate. With this view in mind decentralized group key management is taken into consideration. A novel structure of the node is proposed and each entity holds a secret share SS i of each node in cluster is controlled by its cluster head, the policy enforcer decides for the working of intelligent agent, which is assigned to do the management, which allows two or more parties to derive shared key as a function of information associated with the protocol and so no party can predetermine the resulting value. Group membership certificate is used for group authentication and by the use threshold key scheme secret data is transferred. The SS i of each node is calculated by use of Polynomial interpolation and cluster head key by modular arithmetic, and information is carried by the policy based agents named intelligent agents.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.