A hierarchical key management scheme for secure group communications in mobile ad hoc networks Authors: Nen-Chung Wang and Shian-Zhang Fang Sources: The.

Slides:



Advertisements
Similar presentations
Efficient Kerberized Multicast Olga Kornievskaia University of Michigan Giovanni Di Crescenzo Telcordia Technologies.
Advertisements

A key agreement protocol using mutual Authentication for Ad-Hoc Networks IEEE 2005 Authors : Chichun Lo, Chunchieh Huang, Yongxin Huang Date : 2005_11_29.
A Survey of Key Management for Secure Group Communications Celia Li.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
1 Performance Char’ of Region- Based Group Key Management --- in Mobile Ad Hoc Networks --- by Ing-Ray Chen, Jin-Hee Cho and Ding-Chau Wang Presented by.
Presentation By: Garrett Lund Paper By: Sandro Rafaeli and David Hutchison.
Yan (Lindsay) Sun and K. J. Ray Liu IEEE/ACM Transactions on Networking, Dec Presented by Seo Bon Keun, 2008.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style A Survey on Decentralized Group Key Management Schemes.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5 Group Key Management.
KAIS T Scalable Key Management for Secure Multicast Communication in the Mobile Environment Jiannong Cao, Lin Liao, Guojun Wang Pervasive and Mobile Computing.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Secure Group Communications Using Key Graphs Chung Kei Wong, Member, IEEE, Mohamed Gouda Simon S. Lam, Fellow, IEEE Evgenia Gorelik Yuksel Ucar.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Design of Efficient and Secure Multiple Wireless Mesh Network Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date: 2005/06/28.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Group Key Distribution Chih-Hao Huang
Multicast Security Issues and Solutions. Outline Explain multicast and its applications Show why security is needed Discuss current security implementations.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
Key Distribution and Update for Secure Inter- group Multicast Communication Ki-Woong Park Computer Engineering Research Laboratory Korea Advanced Institute.
Hierarchical agent-based secure and reliable multicast in wireless mesh networks Yinan LI, Ing-Ray Chen Robert Weikel, Virginia Sistrunk, Hung-Yuan Chung.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Secure Group Communication: Key Management by Robert Chirwa.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Improving MBMS Security in 3G Wenyuan Xu Rutgers University.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Secure emergency communication of cellular phones in ad hoc mode Authors: Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, and Leonard Barolli. Sources: Ad.
DDR-based Multicast routing Protocol with Dynamic Core (DMPDC) Shiyi WU, Navid Nikaein, Christian BONNET Mobile Communications Department EURECOM Institute,
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
TOPOLOGY MANAGEMENT IN COGMESH: A CLUSTER-BASED COGNITIVE RADIO MESH NETWORK Tao Chen; Honggang Zhang; Maggio, G.M.; Chlamtac, I.; Communications, 2007.
Two-tier authentication for cluster and individual sets in mobile ad hoc networks Authors: Yuh-Ren Tsai and Shiuh-Jeng Wang Sources: Computer Networks,
The School of Electrical Engineering and Computer Science (EECS) CS/ECE 419/478 Applied Cryptography ADVANCED KEY ESTABLISHMENT AND GROUP KEY MANAGEMENT.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Secure and efficient key management in mobile ad hoc networks Authors: Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, and Spyros Magliveras Sources:
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Key management for wireless sensor networks Sources: ACM Transactions on Sensor Networks, 2(4), pp , Sources: Computer Communications, 30(9),
Group Key Distribution Xiuzhen Cheng The George Washington University.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
Forwarding Group Multicast Protocol (FGMP) for Multihop, Mobile Wireless Networks Speaker : Wilson Lai Date : Ching-Chuan Chiang, Mario Gerla.
Weight-Based Clustering Multicast Routing Protocol for Mobile Ad Hoc Networks Chun-Chieh Huang, Ruay-shiung Chang and Ming-Huang Guo National Dong-Hwa.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks Authors: Song Guo, A-Ni Shen, and Minyi Guo Source: IEICE Transactions.
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments Authors: Kui Ren, Wenjing Lou, Kwangjo Kim, and.
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
Security Kim Soo Jin. 2 Contents Background Introduction Secure multicast using clustering Spatial Clustering Simulation Experiment Conclusions.
An adaptive Multihop Clustering Scheme for Highly Mobile Ad Hoc Networks Tomoyuki Ohta, Shinji Inoue, and Yoshiaki Kakuda ISADS 2003.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing Authors: Prayag Narula, Sanjay Kumar Dhurandher, Sudip Misra,
Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks Authors: R. Lu, Z. Cao, L. Wang, and C. Sun Sources: Computer Standards.
KAIS T A Secure Group Key Management Scheme for Wireless Cellular Network Hwayoung Um and Edward J. Delp, ITNG’ Kim Pyung.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
A three round authenticated group key agreement protocol for ad hoc networks Authors: Daniel Augot, Raghav Bhaskar, Valérie Issarny, and Daniele Sacchetti.
Qiong Zhang, Yuke Wang Jason P, Jue 2008
Wireless Ad Hoc Multicast and ODMRP CS 218 Fall 2017
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
به نام آنکه هستی نام از او یافت
Other Routing Protocols
Presentation transcript:

A hierarchical key management scheme for secure group communications in mobile ad hoc networks Authors: Nen-Chung Wang and Shian-Zhang Fang Sources: The Journal of Systems and Software, accepted manuscript. Reporter: Chun-Ta Li ( 李俊達 )

2 22 Outline  Motivation  The hierarchical key management scheme (HKMS)  Comments

3 Motivation  Key management scheme in a MANET Improving security  Message encryption/decryption  Forward secrecy and backward secrecy Reducing the memory storage of keys  Clustering or hierarchical trees Frequent changes of the network topology (rekeying)  Members join or leave a group  Manage keys efficiently and reduce the amount of rekeying

4 The hierarchical key management scheme  Notations  Key management (2-hop) ◙ Procedure 1: L1-head selecting ◙ Procedure 2: L2-head selecting public/private key

5 The hierarchical key management scheme (cont.)  The node communications in different subgroups Subgroup 1 Subgroup 3 Subgroup 4 Subgroup 2 Subgroup 5 K c (2,3) K c (2,5) K c (3,4)

6 The hierarchical key management scheme (cont.)  Encryption/decryption operation during data transmission Subgroup 1 Subgroup 2 L2GK 1,1,K DH,Data L1GK 1,K DH,Data L2GK 1,2,K DH,Data K c,K DH,Data L2GK 2,3,K DH,Data L1GK 2,K DH,Data L2GK 2,1,K DH,DataData

7 The hierarchical key management scheme (cont.)  Subgroup key maintenance New node joining a subgroup  ◙ Step1: Sends a join request message ◙ Step2: Sends the join request message to the L2-head ◙ Step3: Sends a reply message ◙ Step4: Allowed to join the L2-subgroup ◙ Step5: L2-head regenerates an L2-subgroup key and sends it to all L2-subgroup nodes

8 The hierarchical key management scheme (cont.)  Node leaving a subgroup (Case 1) The leaving of ordinary nodes  Step 1: Sends a leave message to the L2-head  Step 2: L2-head regenerates a new L2-subgroup key and sends it to all remaining nodes H1H1 H 1,1 H 1,2 Subgroup 1 Ordinary node Node leaving Ordinary node

9 The hierarchical key management scheme (cont.)  Node leaving a subgroup (Case 2) The leaving of L2-heads H1H1 H 1,1 H 1,2 Subgroup 1 A Ordinary node Node leaving Ordinary node ◙ Step1: Sends a leave message to ordinary nodes and the L1-head ◙ Step2: Selects a new L2-head(A) by comparing the weight values of the ordinary nodes ◙ Step3: Sends the updated L2-subgroup information to the L1-head ◙ Step4: L1-head regenerates a new subgroup key and sends it to all the L2-heads ◙ Step5: L2-head regenerates a new subgroup key and sends it to all the ordinary nodes of L2-subgroup

10 The hierarchical key management scheme (cont.)  Node leaving a subgroup The leaving of L2-heads H1H1 H 1,2 Subgroup 1 A Ordinary node

11 The hierarchical key management scheme (cont.)  Node leaving a subgroup (Case 3) The leaving of L1-head H1H1 H 1,1 H 1,2 Subgroup 1 A Ordinary node Node leaving Ordinary node ◙ Step1: Sends a leave message to L2-heads ◙ Step2: Selects a new L1-head from L2-heads ◙ Step3: Selects a new L2-head from ordinary nodes of L2-subgroup ◙ Step4: All L2-heads send their L2- subgroup information to the new L1-head for registration ◙ Step5: L1-head regenerates a new subgroup key and sends it to all L2-heads ◙ Step6: L2-heads regenerate a new subgroup key and sends it to all ordinary nodes of L2- subgroup

12 The hierarchical key management scheme (cont.)  Node leaving a subgroup The leaving of L1-head H1H1 H 1,2 Subgroup 1 A Ordinary node

13 Comments  Rekeying in HKMS Join: m+1 asymmetric encryption/decryption Leave:  Case 1: m asymmetric encryption/decryption  Case 2,3: p asymmetric encryption/decryption m: number of nodes in L2-subgroup k: number of L2 heads p: total nodes in a subgroup (p=mk+1) H1H1 H 1,1 H 1,2 Subgroup 1 Ordinary node

14 Comments (cont.) 1 23 Subgroup 1 Ordinary node L1GK1 = H(1 ♁ 2 ♁ 3) L2GK 1,1 = H(L1GK1, H(4 ♁ 5 ♁ 6))L2GK 1,2 = H(L1GK1, H(7 ♁ 8 ♁ 9)) 1,2,3,4,5,6,7,8,9 4,5,67,8,9 5,6 4,6 4,5 7,8 7,9 8,9

15 Comments (cont.)  Join 1 23 Subgroup 1 Ordinary node L1GK1 = H(1 ♁ 2 ♁ 3) new L2GK 1,1 = H(L2GK 1,1, 10) L2GK 1,2 = H(L1GK1, H(7 ♁ 8 ♁ 9)) 1,2,3,4,5,6,7,8,9,10 4,5,6,107,8,9 5,6,10 4,6,10 4,5,10 7,8 7,9 8,9 10 4,5,6

16 Comments (cont.)  Leave (Case 1) 1 23 Subgroup 1 Ordinary node L1GK1 = H(1 ♁ 2 ♁ 3) new L2GK 1,1 = H(L2GK 1,1, 4) L2GK 1,2 = H(L1GK1, H(7 ♁ 8 ♁ 9)) 1,2,3,4,5,6,7,8,9,10 4,5,6,107,8,9 5,6,10 4,6,10 4,5,10 7,8 7,9 8,9 10 4,5,6

17 Comments (cont.)  Leave (Case 2) 1 23 Subgroup 1 Ordinary node New L2-head Ordinary node L1GK1 = H(1 ♁ 2 ♁ 4’) 1,3,4’,5,6,7,8,9,10 7,8,9 5,6,10 6,10 5,10 7,8 7,9 8,9 10 5,6 L2GK 1,1 = H(L1GK1, H(5 ♁ 6 ♁ 10))L2GK 1,2 = H(L1GK1, H(7 ♁ 8 ♁ 9))

18 Comments (cont.)  Leave (Case 3) 1 23 Subgroup 1 Ordinary node L1GK1 = H(1 ♁ 2 ♁ 3) new L2GK 1,1 = H(L2GK 1,1, 4) L2GK 1,2 = H(L1GK1, H(7 ♁ 8 ♁ 9)) 1,2,3,4,5,6,7,8,9,10 4,5,6,107,8,9 5,6,10 4,6,10 4,5,10 7,8 7,9 8,9 10 4,5,6

19 Comments (cont.)  Leave (Case 3) 2 43 Subgroup 1 Ordinary node L1GK1 = H(2’ ♁ 3 ’ ♁ 4’) L2GK 1,1 = H(L1GK1, H(4 ♁ 5 ♁ 6))L2GK 1,2 = H(L1GK1, H(7 ♁ 8 ♁ 9)) 2’,3’,4’,5’,6’,7’,8’,9’,10’ 5’,6’,10’7’,8’,9’ 5’,6’ 6’,10’ 5’,10’ 7’,8’ 7’,9’ 8’,9’