Scalable and Efficient Key Agreement Protocols for Secure Multicast Communication in MANETs
نویسندگان
چکیده
-In this paper protocols for group key distribution are compared and evaluated from the point of view of Mobile Ad Hoc Networks (MANETs). A MANET is a collection of wireless mobile nodes, communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. So the need to render those networks as autonomous and secure as possible, since no central authorization can be assumed at all times, becomes emergent. Key management is the service that ensures the security of communication among nodes, and the capability of their cooperation as a secure group. It consists of three important services: key generation, user authentication and key distribution. In this work we assume that the participating users have already been authenticated with some mechanism, and we are focused only on studying and comparing protocols for group key establishment in MANETs. We are addressing the issues of FaultTolerance and Efficiency for key distribution protocols for group communications in MANETs. Most key distribution protocols that exist today are primarily designed for wireline networks. These protocols either fail to work as intended or cannot work at all when they are applied to the demanding environment of MANETs. The main reasons for this are: frequent node failures, network partitions and merges, inefficient computational and communication capabilities of certain wireless nodes, network delay, bad quality of signal etc. We determine the framework under which protocols can efficiently work in MANETs, design new protocols or modify existing ones, so that they can be robust, scalable and applicable in this environment. We classify these protocols in two families, contributory and non-contributory. We evaluate them from the point of view of MANETs and compare their performance.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملFault - Tolerant Extension of Hypercube Algorithm for Efficient , Robust Group Communications in MANETs
Securing multicast communications in Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research directions in the areas of wireless networking and security. MANETs are emerging as the desired environment for an increasing number of commercial and military applications, addressing also an increasing number of users. Security on the other hand, is becoming an indispensable re...
متن کاملIntroduction to Protocols Used in the Two - Level Hybrid Scheme
A MANET is a collection of wireless mobile nodes, possibly heterogeneous, communicating among themselves over possibly multi-hop paths, without the help of fixed infrastructure. In MANETs, high mobility may result in nodes frequently going out of range or running out of battery, leading in temporary links. Collisions, low link quality, distance between nodes and various other factors result in ...
متن کاملOn the performance of group key management protocols in MANETs
The establishment of Group Key Management Protocols (GKMPs) is the most suitable solution to provide secure multicast communication within ad hoc networks. However, these protocols have to take into account the characteristics of a such environment, with mobility of nodes, wireless links and low capacities. The evaluation of these protocols becomes thus mandatory to guarantee their adequacy and...
متن کاملScalable secure one-to-many group communication using dual encryption
Multicasting is a scalable solution for group communication. Whereas secure unicast is a well-understood problem, scalable secure multicast poses several unique security problems, namely groupmembership control, scalable key distribution to a dynamic group. We address scalability in the pro-posed protocol by using hierarchical subgrouping. Third party hosts or members of the mul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003