Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Gprkey-A Novel Group Key Rekeying Technique for Manet


Affiliations
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, India
2 Department of Computer Science and Engineering, GSSS Institute of Engineering and Technology for Women, India
     

   Subscribe/Renew Journal


A Mobile Ad hoc Network (MANET) is a collection of autonomous nodes or mobile devices that can arrange themselves in various ways and work without strict network administration. Ensuring security in mobile ad hoc networks is a challenging issue and most of the applications in mobile ad hoc networks involve group oriented communication. Mostly cryptographic techniques are used to provide the security to MANETs. Cryptographic techniques will not be efficient security mechanism if the key management is weak. The issue of packet loss in MANET that is caused due to multi casting and backward and forward secrecy results in mobility. Hence, we investigate on this issue and propose a method to overcome this scenario. On analysing the situation we find that frequent rekeying leads to huge message overhead and hence increases energy utilization. With the existing key management techniques it causes frequent disconnections and mobility issues. Therefore, an efficient multi casting group key management will help to overcome the above problems. In this paper we propose a novel group key rekeying technique named GPRKEY (Group key with Periodic ReKEYing) deal with scalability issue of rekeying and also analyze the performance of the newly proposed key management method using key trees. In this approach we use the periodic rekeying to enhance the scalability and avoid out of sync problems. We use sub trees and combine them using the merging algorithm and periodic re-keying algorithm. The GPRKEY is evaluated through NS-2 simulation and compared with existing key management techniques OFT (One-way Function Tree) and LKH (Logical Key Hierarchy). The security and performance of rekeying protocols are analyzed through detailed study and simulation.

Keywords

Mobile Ad Hoc Networks, Periodic, Security, Rekey, Sub Tree.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Muhammad Yasir Malik, “Efficient Group Key Management Schemes for Multi Cast Dynamic Communication Systems”, Available at: https://eprint.iacr.org/2012/628.pdf, Accessed on 2012.
  • Bing Wu, Jie Wu, Eduardo B. Fernandez and Spyros Magliveras, “Secure and Efficient Key Management in Mobile Ad Hoc Networks”, Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium, pp. 21-25, 2005.
  • Zainab R. Zaidi, Brian L. Mark, “Mobility Tracking Based on Autoregressive Models”, IEEE Transactions on Mobile Computing, Vol. 10, No. 1, pp. 32-43, 2009.
  • A. Renuka and K.C. Shet, “Hierarchical Approach for Key Management in Mobile Ad hoc Networks”, International Journal of Computer Science and Information Security, Vol. 5, No. 1, pp. 87-95, 2009.
  • M.S. Bouassida, Isabelle Chrisment and Oliver Festor, “Group Key Management in MANETs”, International Journal of Network Security, Vol. 6, No. 1, pp. 67-79, 2008.
  • D. Whitefield and Martin E. Hellman, “New Direction in Cryptography”, IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 73-77, 1976.
  • Maria Striki and John S. Baras, “Key Distribution Protocols for Secure Multi Cast Communication Survivable in MANETs”, Proceedings of IEEE Military Communications Conference, pp. 112-116, 2003.
  • D. Suganyadevi and G. Padmavathi, “Dynamic Clustering for QoS based Secure Multi Cast Key Distribution in Mobile Ad Hoc Networks”, International Journal of Computer Science, Vol. 7, No. 5, pp. 11-16, 2010.
  • Dijiang Huang and Deep Medhi, “A Secure Group Key Management Scheme for Hierarchical Mobile Ad Hoc Networks”, Ad Hoc Networks, Vol. 6, No. 5, pp. 560-577, 2007.
  • Chung Kei Wong and Simon S. Lam, “Keystone a Group Key Management Systems”, Proceedings of International Conference on Telecommunication, pp. 1-5, 2000.
  • Roger G. Kermode, “Scoped Hybrid Automatic Repeat Request with Forward Error Correction”, Proceedings of ACM International Conference on Applications, Technologies and Architectures, pp. 11-15, 1998.
  • S. Rafaeli and D. Hutchison, “A Survey of Key Management for Secure Group Communication”, ACM Computing Surveys, Vol. 35, No. 3, pp. 309-329, 2003.
  • W.C. Ku and S.M. Chen, “An Improved Key Management Scheme for Large Dynamic Groups using One-Way Function Trees”, Proceedings of the International Conference on Parallel Processing Workshops, pp. 391396, 2003.
  • C. Siva Ram Murthy and B.S. Manoj, “Ad Hoc Wireless Networks: Architectures and Protocols, Portable Documents”, 1st Edition, Prentice hall, 2004.
  • S. Singh, M. Woo and C. Raghavendra, “Power Aware Routing in Mobile Ad Hoc Network”, Proceedings of International Conference on Mobile Computing and Networking, pp. 181-190, 1998.
  • V. Rodoplu and T. Meng, “Minimum Energy Mobile Wireless Networks”, IEEE Journal on Selected Areas on Communications, Vol. 17, No. 8, pp. 1333-1344, 1999.
  • J. Zhu and X. Wang, “Peer: A Progressive Energy Efficient Routing Protocol for Wireless Ad Hoc Networks”, Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 3, pp. 18871896, 2005.
  • S. Yi, P. Naldurg and R. Kravets, “Security-Aware Ad-Hoc Routing for Wireless Networks”, Proceedings of 24th ACM International Conference on Mobile Ad Hoc Networking and Computing, pp. 299-302, 2001.
  • Wee Hock Desmond Ng, Michael Howarth, Zhili Sun and Haitham Cruickshank, “Dynamic Balanced Key Tree Management for Secure Multi cast Communications”, IEEE Transactions on Computers, Vol. 56, No. 5, pp. 590-605, 2007.
  • X.S. Li, Y.R. Yang, M. Gouda and S. Lam, “Batch ReKeying for Secure Group Communications”, Proceedings of 10th International Conference on World Wide Web, pp. 525-534, 2001.
  • J. Pegueroles and F. Rico-Novella, “Balanced Batch LKH: New Proposal, Implementation and Performance Evalution”, Proceedings of 8th IEEE International Symposium on Computers and Communication, pp. 421-427, 2003.
  • A. John Prakash, V. Rhymend Uthariaraj and B. Lydia Elizabeth, “Efficient Key Management Protocol with Predictive Rekeying for Dynamic Networks”, Proceedings of 2nd International Conference on Green High Performance Computing, pp. 321-324, 2016.
  • W. Ng and Z. Sun, “Multi-Layers LKH”, Proceedings of IEEE International Conference on Communications, pp. 334-337, 2005.
  • Q. Liu, Song Ningning, and Zeng Wenlu, “Research of Centralized Multicast Key Management for LEO Satellite Networks”, Proceedings of IEEE International Conference on Cyberspace Technology, pp. 111-114, 2013 [25] X.B. Zhang, S.S. Lam, D.Y. Lee and Y.R. Yang, “Protocol Design for Scalable and Reliable Group Re-Keying”, IEEE/ACM Transactions on Networking, Vol. 11, No. 6, pp. 908-922, 2001.
  • S. Setia, S. Koussih, S. Jajodia and E. Harder, “A Scalable Group Re-Keying Approach for Secure Multi Cast”, Proceedings of IEEE Symposium on Security and Privacy, pp. 221-224, 2000.
  • Y. Kim, A. Perrig and G.Tsudik, “Group Key Agreement Efficient in Communication”, Available at: http://www.ics.uci.edu/~gts/paps/jkpt02.pdf, Accessed on 2001.
  • M. Hajyvahabzadeh, E. Eidkhani, S.A. Mortazavi and A.N. Pour, “A New Group Key Management Protocol using Code for Key Calculation: CKC”, Proceedings of International Conference on Information Science and Applications, pp. 1-6, 2010.
  • S. Zhao, R. Kent and A. Aggarwal, “A Key Management and Secure Routing Integrated Framework for Mobile Ad Hoc Networks”, Ad Hoc Networks, Vol. 11, No. 3, pp. 1046-1061, 2013.
  • Bin Tian, Yang Xin, and Shoushan Luo, “A Novel Key Management Method for Wireless Sensor Networks”, Proceedings of 3rd IEEE International Conference on Broadband Network and Multimedia Technology, pp. 1-6, 2011.

Abstract Views: 216

PDF Views: 3




  • Gprkey-A Novel Group Key Rekeying Technique for Manet

Abstract Views: 216  |  PDF Views: 3

Authors

C. Shanmuganathan
Department of Computer Science and Engineering, Manonmaniam Sundaranar University, India
P. Raviraj
Department of Computer Science and Engineering, GSSS Institute of Engineering and Technology for Women, India

Abstract


A Mobile Ad hoc Network (MANET) is a collection of autonomous nodes or mobile devices that can arrange themselves in various ways and work without strict network administration. Ensuring security in mobile ad hoc networks is a challenging issue and most of the applications in mobile ad hoc networks involve group oriented communication. Mostly cryptographic techniques are used to provide the security to MANETs. Cryptographic techniques will not be efficient security mechanism if the key management is weak. The issue of packet loss in MANET that is caused due to multi casting and backward and forward secrecy results in mobility. Hence, we investigate on this issue and propose a method to overcome this scenario. On analysing the situation we find that frequent rekeying leads to huge message overhead and hence increases energy utilization. With the existing key management techniques it causes frequent disconnections and mobility issues. Therefore, an efficient multi casting group key management will help to overcome the above problems. In this paper we propose a novel group key rekeying technique named GPRKEY (Group key with Periodic ReKEYing) deal with scalability issue of rekeying and also analyze the performance of the newly proposed key management method using key trees. In this approach we use the periodic rekeying to enhance the scalability and avoid out of sync problems. We use sub trees and combine them using the merging algorithm and periodic re-keying algorithm. The GPRKEY is evaluated through NS-2 simulation and compared with existing key management techniques OFT (One-way Function Tree) and LKH (Logical Key Hierarchy). The security and performance of rekeying protocols are analyzed through detailed study and simulation.

Keywords


Mobile Ad Hoc Networks, Periodic, Security, Rekey, Sub Tree.

References