A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study

被引:20
作者
Rong, Bo [1 ]
Chen, Hsiao-Hwa [2 ]
Qian, Yi [3 ]
Lu, Kejie [4 ]
Hu, Rose Qingyang [5 ]
Guizani, Sghaier [6 ]
机构
[1] Int Inst Telecommun, Montreal, PQ H5A 1K6, Canada
[2] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 701, Taiwan
[3] Natl Inst Stand & Technol, Gaithersburg, MD 20899 USA
[4] Univ Puerto Rico, Dept Elect & Comp Engn, Mayaguez, PR 00681 USA
[5] Nortel Networks, Richardson, TX 75082 USA
[6] Qatar Univ, Math & Comp Dept, Doha 2713, Qatar
基金
美国国家科学基金会;
关键词
Group-oriented computing; key management; mobile ad hoc network (MANET); multicast; pyramidal security model; MULTICAST; TREE; SCHEMES; DIRECTIONS; AGREEMENT; DESIGN;
D O I
10.1109/TVT.2008.923666
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In mobile ad hoe networks (MANETs), many applications require group-oriented computing among a large number of nodes in an adversarial environment. To deploy these large-scale cooperative applications, secure multicast service must be provided to efficiently and safely exchange data among nodes. The existing literature has extensively studied security protection for a single multicast group, in which all nodes are assumed to have the same security level. However, such an assumption may not be valid in practice because, for many applications, different users can play different roles and thus naturally be classified into multiple security levels. In this paper, we propose a pyramidal security model to safeguard the multisecurity-level information sharing in one cooperation domain. As a prominent feature, a pyramidal security model contains a set of hierarchical security groups and multicast groups. To find an efficient key management solution that covers all the involved multicast groups, we develop the following three schemes for the proposed security model: 1) separated star key graph; 2) separated tree key graph, and 3) integrated tree key graph. Performance comparison demonstrates that the scheme of integrated tree key graph has advantages over its counterparts.
引用
收藏
页码:398 / 408
页数:11
相关论文
共 19 条
[1]   Key management for restricted multicast using broadcast encryption [J].
Abdalla, M ;
Shavitt, Y ;
Wool, A .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2000, 8 (04) :443-454
[2]  
[Anonymous], 2003, P 22 ANN S PRINC DIS
[3]   New multiparty authentication services and key agreement protocols [J].
Ateniese, G ;
Steiner, M ;
Tsudik, G .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) :628-639
[4]   Multicast over wireless mobile ad hoc networks: Present and future directions [J].
Cordeiro, CD ;
Gossain, H ;
Agrawal, DP .
IEEE NETWORK, 2003, 17 (01) :52-59
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]   Dynamics of key management in secure satellite multicast [J].
Howarth, MP ;
Iyengar, S ;
Sun, ZL ;
Cruickshank, H .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004, 22 (02) :308-319
[7]   Multiple key sharing and distribution scheme with (n, t) threshold for NEMO group communications [J].
Jiang, Yinxin ;
Lin, Chuang ;
Shi, Minghui ;
Shen, Xuemin .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (09) :1738-1747
[8]  
Kim Y., 2000, ACM C COMPUTER COMMU, P235, DOI [10.1145/352600.352638, DOI 10.1145/352600.352638]
[9]   Design of secure multicast key management schemes with communication budget constraint [J].
Li, MY ;
Poovendran, R ;
Berenstein, C .
IEEE COMMUNICATIONS LETTERS, 2002, 6 (03) :108-110
[10]   Family ACK tree (FAT): Supporting reliable multicast in mobile ad hoc networks [J].
Liao, WJ ;
Jiang, MY .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2003, 52 (06) :1675-1685