A secure group key management scheme for hierarchical mobile ad hoc networks

被引:21
作者
Huang, Dijiang [1 ]
Medhi, Deep [2 ]
机构
[1] Arizona State Univ, Dept Comp Sci & Engn, Tempe, AZ 85287 USA
[2] Univ Missouri, Dept Comp Sci & Elect Engn, Kansas City, MO 64110 USA
关键词
Security; Group key management; Hierarchy; Ad-hoc network; Many-to-many group communication;
D O I
10.1016/j.adhoc.2007.04.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group key management for large-scale wireless ad-hoc networks. To achieve our goal, we propose the following approaches: (1) a multi-level security model, which follows a modified Bell-La Padula security model that is suitable in a hierarchical mobile ad-hoc networking environment, and (2) a decentralized group key management infrastructure to achieve such a multi-level security model. Our approaches reduce the key management overhead and improve resilience to any single point failure problem. In addition, we have developed a roaming protocol that is able to provide secure group communication involving group members from different groups without requiring new keys; an advantage of this protocol is that it is able to provide continuous group communication even when the group manager fails. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:560 / 577
页数:18
相关论文
共 37 条
  • [1] Alves-Foss J, 2000, P 23 NAT INF SYST SE, P254
  • [2] [Anonymous], 1976, TECH REP
  • [3] Ateniese G., 1998, 5th ACM Conference on Computer and Communications Security, P17, DOI 10.1145/288090.288097
  • [4] Ballardie T, 1996, 1949 RFC
  • [5] Location aware, dependable multicast for mobile ad hoc networks
    Basagni, S
    Chlamtac, I
    Syrotiuk, VR
    [J]. COMPUTER NETWORKS, 2001, 36 (5-6) : 659 - 670
  • [6] Basagni S., 2001, P 2001 ACM INT S MOB, P156
  • [7] BELL DE, 2005, ACSAC 05, P337
  • [8] Bishop Matt, 2012, Computer Security: Art and Science
  • [9] BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
  • [10] Perfectly secure key distribution for dynamic conferences
    Blundo, C
    De Santis, A
    [J]. INFORMATION AND COMPUTATION, 1998, 146 (01) : 1 - 23