A Reliable Secure Multicast Key Distribution Scheme for Mobile Adhoc Networks
Reliable secure multicast communication in mobile
adhoc networks is challenging due to its inherent characteristics of
infrastructure-less architecture with lack of central authority, high
packet loss rates and limited resources such as bandwidth, time and
power. Many emerging commercial and military applications require
secure multicast communication in adhoc environments. Hence key
management is the fundamental challenge in achieving reliable
secure communication using multicast key distribution for mobile
adhoc networks. Thus in designing a reliable multicast key
distribution scheme, reliability and congestion control over
throughput are essential components. This paper proposes and
evaluates the performance of an enhanced optimized multicast cluster
tree algorithm with destination sequenced distance vector routing
protocol to provide reliable multicast key distribution. Simulation
results in NS2 accurately predict the performance of proposed
scheme in terms of key delivery ratio and packet loss rate under
varying network conditions. This proposed scheme achieves
reliability, while exhibiting low packet loss rate with high key
delivery ratio compared with the existing scheme.
[1] T. Chiang and Y. Huang, "Group keys and the multicast security in ad
hoc networks", Proc. IEEE International Conference on Parallel
Processing, IEEE press, pp 385-390, Oct 2003.
[2] T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, "Secure multicast groups on
ad hoc networks". Proc. 1st ACM workshop on security of ad hoc and
sensor networks, ACM Press, pp 94-102.2003.
[3] L. Lazos and R. Poovendram, "Energy-Aware Secure Multicast
Communication in Ad Hoc Networks Using Geographical
Location Information". Proc.IEEE International Conference on
Acoustics Speech and Signal Processing, pp 201-204, Apr 2003.
[4] H. Bettahar, A. Bouabdallah, and M. Alkubeily, "Efficient Key
Management Scheme for Secure Application level", IEEE sym. On
Computers and Communications, pp 489-497, July 2007.
[5] G.Valle, R.Cardenas, "Overview the Key Management in Adhoc
Networks", LCNS 3563, pp 397-406, Aug 2005.
[6] D.Huang, D.Medhi, "A Secure Group Key Management scheme for
Hierarchical Mobile Adhoc Networks", Adhoc Networks, pp 560-577,
June 2008.
[7] B.Kim, H.Cho, J. Lee, "Efficient Key Distribution Protocol for secure
Multicast Communication", LCNS 3043, pp 1007-1016, Apr 2004.
[8] Y. Challal, H. Seba, "Group Key Management Protocols: A novel
Taxonomy", International Journal of Information Technology pp 105-
118, 2005.
[9] L. Dondeti, S. Mukherjee, and A. Samal, "Secure one-to many group
communication sing dual encryption", IEEE sym. On Computers and
Communications, pp 1-25, Jul 1999.
[10] H. Bettahar, A. Bouabdallah, and Y. Challal, "An adaptive key
management protocol for secure multicast", Proc.IEEE International
Conference on Computer Communications and Networks, pp 190-
195, Oct 2002.
[11] M. Bouassida, I. Chrisment, and O. Festor, "An Enhanced Hybrid Key
Management Protocol for Secure Multicast in Ad Hoc Networks".
LCNS 3042, pp 725-742, Apr 2004.
[12] K.Rahman, R.Zaman, A.Reddy, " An Efficient DSDV routing Protocol
for Wireless Mobile Adhoc Networks and its Performance Comparison",
Proc. European Sym. On Computer Modeling and Simulation, pp 508-
511, Nov 2008.
[13] S. Mittra, "Iolus: A framework for scalable secure multicasting",
SIGCOMM, pages 277-288, 1997.
[14] Y. Challal, H. Bettahar, and A. Bouabdallah, "SAKM: A Scalable and
Adaptive Key Management Approach for Multicast Communications",
ACM SIGCOMM Computer Communication Review, pp 55-70, April
2004.
[15] M. Bouassida, I. Chrisment, and O. Festor, "Efficient Clustering for
Multicast Key Distribution in MANETs", LCNS 3462, pp 138-153, May
2005.
[16] M. Bouassida, I. Chrisment, and O. Festor, "Group Key Management in
Manets", International Journal of Network Security, pp 67-79, Jan 2008.
[17] M. Bouassida, I. Chrisment, and O. Festor "Efficient group key
management protocol in MANETs using multipoint relaying technique",
Proc.IEEE International Conference on Networking, pp 64, Apr. 2006.
[1] T. Chiang and Y. Huang, "Group keys and the multicast security in ad
hoc networks", Proc. IEEE International Conference on Parallel
Processing, IEEE press, pp 385-390, Oct 2003.
[2] T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, "Secure multicast groups on
ad hoc networks". Proc. 1st ACM workshop on security of ad hoc and
sensor networks, ACM Press, pp 94-102.2003.
[3] L. Lazos and R. Poovendram, "Energy-Aware Secure Multicast
Communication in Ad Hoc Networks Using Geographical
Location Information". Proc.IEEE International Conference on
Acoustics Speech and Signal Processing, pp 201-204, Apr 2003.
[4] H. Bettahar, A. Bouabdallah, and M. Alkubeily, "Efficient Key
Management Scheme for Secure Application level", IEEE sym. On
Computers and Communications, pp 489-497, July 2007.
[5] G.Valle, R.Cardenas, "Overview the Key Management in Adhoc
Networks", LCNS 3563, pp 397-406, Aug 2005.
[6] D.Huang, D.Medhi, "A Secure Group Key Management scheme for
Hierarchical Mobile Adhoc Networks", Adhoc Networks, pp 560-577,
June 2008.
[7] B.Kim, H.Cho, J. Lee, "Efficient Key Distribution Protocol for secure
Multicast Communication", LCNS 3043, pp 1007-1016, Apr 2004.
[8] Y. Challal, H. Seba, "Group Key Management Protocols: A novel
Taxonomy", International Journal of Information Technology pp 105-
118, 2005.
[9] L. Dondeti, S. Mukherjee, and A. Samal, "Secure one-to many group
communication sing dual encryption", IEEE sym. On Computers and
Communications, pp 1-25, Jul 1999.
[10] H. Bettahar, A. Bouabdallah, and Y. Challal, "An adaptive key
management protocol for secure multicast", Proc.IEEE International
Conference on Computer Communications and Networks, pp 190-
195, Oct 2002.
[11] M. Bouassida, I. Chrisment, and O. Festor, "An Enhanced Hybrid Key
Management Protocol for Secure Multicast in Ad Hoc Networks".
LCNS 3042, pp 725-742, Apr 2004.
[12] K.Rahman, R.Zaman, A.Reddy, " An Efficient DSDV routing Protocol
for Wireless Mobile Adhoc Networks and its Performance Comparison",
Proc. European Sym. On Computer Modeling and Simulation, pp 508-
511, Nov 2008.
[13] S. Mittra, "Iolus: A framework for scalable secure multicasting",
SIGCOMM, pages 277-288, 1997.
[14] Y. Challal, H. Bettahar, and A. Bouabdallah, "SAKM: A Scalable and
Adaptive Key Management Approach for Multicast Communications",
ACM SIGCOMM Computer Communication Review, pp 55-70, April
2004.
[15] M. Bouassida, I. Chrisment, and O. Festor, "Efficient Clustering for
Multicast Key Distribution in MANETs", LCNS 3462, pp 138-153, May
2005.
[16] M. Bouassida, I. Chrisment, and O. Festor, "Group Key Management in
Manets", International Journal of Network Security, pp 67-79, Jan 2008.
[17] M. Bouassida, I. Chrisment, and O. Festor "Efficient group key
management protocol in MANETs using multipoint relaying technique",
Proc.IEEE International Conference on Networking, pp 64, Apr. 2006.
@article{"International Journal of Electrical, Electronic and Communication Sciences:62490", author = "D. SuganyaDevi and G. Padmavathi", title = "A Reliable Secure Multicast Key Distribution Scheme for Mobile Adhoc Networks", abstract = "Reliable secure multicast communication in mobile
adhoc networks is challenging due to its inherent characteristics of
infrastructure-less architecture with lack of central authority, high
packet loss rates and limited resources such as bandwidth, time and
power. Many emerging commercial and military applications require
secure multicast communication in adhoc environments. Hence key
management is the fundamental challenge in achieving reliable
secure communication using multicast key distribution for mobile
adhoc networks. Thus in designing a reliable multicast key
distribution scheme, reliability and congestion control over
throughput are essential components. This paper proposes and
evaluates the performance of an enhanced optimized multicast cluster
tree algorithm with destination sequenced distance vector routing
protocol to provide reliable multicast key distribution. Simulation
results in NS2 accurately predict the performance of proposed
scheme in terms of key delivery ratio and packet loss rate under
varying network conditions. This proposed scheme achieves
reliability, while exhibiting low packet loss rate with high key
delivery ratio compared with the existing scheme.", keywords = "Key Distribution, Mobile Adhoc Network, Multicast
and Reliability.", volume = "3", number = "8", pages = "1626-6", }