Performance Analysis of Secure Group Key Mechanism in Mobile Ad Hoc Networks
-
2018-10-02 https://doi.org/10.14419/ijet.v7i4.10.20932 -
Wireless Sensor Network, Mobile Ad hoc networks, Group key, Symmetric Key. -
Abstract
Mobile Ad-hoc network (MANET) is an effective network administration framework that encourages trading data between remote mobile devices, without the utilization of remote access points and base stations. Security has become a major concern in mobile ad hoc networks. Providing security is the very big challenge in MANET, due to lack of infrastructure, frequent host mobility, and unreliable wireless media. We are using cryptography techniques to provide secure communication in mobile ad hoc networks. To provide security using cryptography, key management is playing a vital role. The key management includes key generation, storage, distribution, revocation, and updating. The authorized group key distributions are the difï¬cult task in MANET. Various types of key management protocols are symmetric, asymmetric, group and hybrid. In a group key management, when a member joins or leaves the group, it needs to generate a new key immediately to maintain authentication or secrecy. The group key management is categorized into three types such as centralized, decentralized and distributed. In this paper, we analyze the performance of different group key management protocol scheme based on some important measure like reliability, limitations, services, storage cost, scalability, intermediate operation, and vulnerabilities. Finally, different categories of key management protocols compared and the results are tabulated
Â
Â
-
References
[1] HuaGuo, Yi Mu, Zhoujun Li, Xiyong Zhang," An efficient and non-interactive hierarchical key agreement protocol" Springer- Computers and Security, 2011.
[2] F. Richard Yu, Helen Tang, Peter C. Mason, and Fei Wang," A Hierarchical Identity-Based Key Management Scheme for Tactical Mobile Ad Hoc Networks", IEEE transactions on network and service management, vol. 7, no. 4, December 2010.
[3] Zainab. Zaidi, Brian L. Mark, “Mobility Tracking Based on Autoregressive Models “IEEE transaction on mobile computing, 2009.
[4] Konstantinou.E, “Cluster-based group key agreement for wireless ad hoc networksâ€, Third International Conference on Availability, Reliability and Security (ARES 08), March 2008, pp. 550–557.
[5] Li-Ping, Guo-Hua, Y. Zhi-Gang,†An efficient group key Agreement protocol for ad hoc networksâ€, Fourth International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM ’08), October 2008, pp. 1–5.
[6] Bouassida, I. Chrisment, O. Festor, “Efficient group key management protocol in MANETs using the multipoint relaying technique, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies April 2006, pp. 64–71.
[7] Li, R. Levy, M. Yu, B. Bhattacharjee,†A scalable key management and clustering scheme for ad hoc networksâ€, International Conference on Scalable Information Systems, vol.28, 2006, pp. 1–10.
[8] Rachedi A, Benslimane A, "A secure architecture for mobile ad hoc networks ", Springer's Lecture Notes in Computer Science. Hong Kong, China, December 2006. p. 424–35
[9] M. Steiner, G. Tsudik, M. Waidner,†Key agreement in dynamic peer Groupsâ€, IEEE Transactions on Parallel and Distributed Systems 11 (8) (2000) pp769–780.
[10] Y. Kim, A. Perrig, G. Tsudik,†Simple and fault-tolerant key agreement for dynamic collaborative groupsâ€, Proceedings of the Seventh ACM conference on Computer and Communications Security, ACM, New York, NY, USA, 2000, pp. 235–244.
[11] Zhou, Haas,"Securing ad hoc network", Technical Report, USA; 1999.
[12] M. Burmester, Y. Desmedt, “A secure and efficient conference key distribution systemâ€, Lecture Notes in Computer Science 1998, pp 275–286.
[13] M. Steiner, G. Tsudik, Waidner, “Diffie–Hellman key distribution extended to group communicationâ€, CCS ’96: Proceedings of the Third ACM Conference on Computer and Communications security, 1996, pp. 31–37.
[14] Shamir A,†Identity-based cryptosystems and signature schemes. Advances in Cryptology-CRYPTO'84, LNCS 196. Springer-Verlag, BerlinHeidelberg. 1984: 47−53.
[15] C.Y. Yeun, K. Han, D.L. Vo and K.J. Kim, Secure authenticated group key management protocol in the MANET environment, Information Security Technical Report, Elsevier, Vol. 13, No. 3, pp. 158-164, August 2008.
[16] T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, “Secure multicast groups on Ad Hoc networks,†in Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 94-102, 2003.
[17] L. Lazos and R. Poovendram, “Energy-aware secure multicast communication in Ad Hoc networks using geographical location information,†in IEEE International Conference on Acoustics Speech and Signal Processing, pp. 201-204, 2003.
[18] M. Moharrun, R. Mukkalamala, and M. Eltoweissy, “Ckds: An efficient combinatorial key distribution scheme for wireless Ad Hoc networks,†in IEEE International Conference on Performance, Computing and Communications (IPCCC’04), pp. 631-636, Apr. 2004.
[19] S. Zhu, S. Setia, S. Xu, and S. Jajodia, GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad Hoc Networks Technical report, Feb.2004.
[20] W. Diffie and M. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, pp. 644-654, Nov.1976.
[21] I. Ingemarson, D. Tang, and C. Wong, “A conference key distribution system,†IEEE Transactions on Information Theory, pp.714-720, Sep. 1982.
[22] M. Steiner, G. Tsudik, and M. Waidner, “CLIQUES: A new approach to Group Key Agreement,†Proceedings of ICDCS'98, 1998.
[23] A. EL-Sayed, A new hierarchical group key management based on clustering scheme for mobile ad hoc networks,†International Journal of Advanced Computer Science and Applications, pp. 208-219, 2014
[24] Rafaeli, S. and Hutchison, D., A Survey of Key Management for Secure Group Communication, ACM computing Surveys, vol. 35, no. 3, pp. 309-329, 2003.
-
Downloads
-
How to Cite
C, S., & P, R. (2018). Performance Analysis of Secure Group Key Mechanism in Mobile Ad Hoc Networks. International Journal of Engineering & Technology, 7(4.10), 344-348. https://doi.org/10.14419/ijet.v7i4.10.20932Received date: 2018-10-04
Accepted date: 2018-10-04
Published date: 2018-10-02