Improving performance overhead of a trust-clustering key management protocol in ad hoc networks

被引:0
作者
Sadi M. [1 ]
Amad M. [2 ]
Badache N. [3 ]
机构
[1] Laboratoire d'Informatique Medicale, Faculte des Sciences Exactes, Universite de Bejaia, Bejaia
[2] Laboratoire LIMPAF, Departement d'Informatique, Faculte des Sciences et Sciences Appliquees, Universite de Bouira
[3] Centre de Recherche sur l'Information, Scientifique et Technique (CERIST), DTISI, 3 rue des frères Aissou, Ben-Aknoun, Alger
来源
International Journal of Electronic Security and Digital Forensics | 2020年 / 12卷 / 02期
关键词
ECC; Elliptic curve cryptography; Group key management; MANETs; Mobile ad hoc network; Trust clustering;
D O I
10.1504/IJESDF.2020.106319
中图分类号
学科分类号
摘要
Group key management is a challenge for securing group communications in the networks. This area is well studied in the literature. The strict characteristics of mobile ad hoc networks makes the adaptation of classical existing solutions a real challenge. Elliptic curves cryptography (ECC) became the choice of encryption for wireless ad hoc and sensor networks. It uses very small keys and is mathematically very effective, which makes them ideal in communication for small devices used today. Scalability is a basic factor that determines the efficiency of any group key management protocol. Recent solutions for MANETs are oriented towards hierarchical solutions of group key agreement using clustering. Trust oriented clustering scheme is the most adequate for secure group communication. We focus in this paper on ECC technology and its contribution for group key agreement solutions in mobile ad hoc networks using trust criteria for cluster's formation. We propose a novel solution to reduce the group key establishment overhead. The effectiveness of our solution lies in its avoidance of malicious members from being chosen as group controllers (clusterheads). The performance evaluation of the proposed solution shows that is globally satisfactory. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:214 / 228
页数:14
相关论文
共 43 条
[1]  
Al-Sultan S., Al-Doori M.M., Al-Bayatti A.H., Zedam H., A comprehensive survey on vehicular ad hoc network, J. Netw. Comput. Appl., 37, pp. 380-392, (2014)
[2]  
Amad M., Aissani D., Meddahi A., Saadi M., Multi group key agreement mechanism for mobile P2P wireless networks, CIIA'11, (2011)
[3]  
Augot D., Bhaskar R., Issarny V., Sacchetti D., An efficient group key agreement protocol for ad hoc networks, Sixth IEEE International Symposium on A World of Wireless Mobile and Multimedia Networks (WoWMOM)., (2005)
[4]  
Balachandran R.K., Ramamurthy B., Zou X., Vinodchandran N.V., CRTDH: An efficient key agreement scheme for secure group communications in wireless ad hoc networks, IEEE International Conference on Communications (ICC)., (2005)
[5]  
Burmester M., Desmedt Y., A secure and efficient conference key distribution system, Advances in Cryptography - EuroCrypt-94, Lecture Notes in Computer Science, (1994)
[6]  
Challal Y., Seba H., Group key management protocols: A novel taxonomy, International Journal of Information Technology, 2, 1, pp. 105-118, (2005)
[7]  
Cheklat L., Amad M., Boukerram A., A limited energy consumption model for P2P wireless sensor networks, Wireless Personal Communications, (2017)
[8]  
Cho J.-H., Chen I.-R., Wang D.C., Performance optimization of region-based group key management in mobile ad hoc networks, Performance Evaluation, 65, 5, pp. 319-344, (2008)
[9]  
Daghighi B., Mat Kiah M.L., Iqbal S., Rehman M.H.U., Martin K., Host mobility key management in dynamic secure group communication, Wireless Networks, 24, 8, pp. 3009-3027, (2018)
[10]  
Diffie W., Hellman E.M., New directions in cryptography, IEEE Transactions on Information Theory, 22, 6, pp. 644-654, (1976)