A Reliable Secure Multicast Key Distribution Scheme for Mobile Adhoc Networks

Reliable secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Many emerging commercial and military applications require secure multicast communication in adhoc environments. Hence key management is the fundamental challenge in achieving reliable secure communication using multicast key distribution for mobile adhoc networks. Thus in designing a reliable multicast key distribution scheme, reliability and congestion control over throughput are essential components. This paper proposes and evaluates the performance of an enhanced optimized multicast cluster tree algorithm with destination sequenced distance vector routing protocol to provide reliable multicast key distribution. Simulation results in NS2 accurately predict the performance of proposed scheme in terms of key delivery ratio and packet loss rate under varying network conditions. This proposed scheme achieves reliability, while exhibiting low packet loss rate with high key delivery ratio compared with the existing scheme.




References:
[1] T. Chiang and Y. Huang, "Group keys and the multicast security in ad
hoc networks", Proc. IEEE International Conference on Parallel
Processing, IEEE press, pp 385-390, Oct 2003.
[2] T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, "Secure multicast groups on
ad hoc networks". Proc. 1st ACM workshop on security of ad hoc and
sensor networks, ACM Press, pp 94-102.2003.
[3] L. Lazos and R. Poovendram, "Energy-Aware Secure Multicast
Communication in Ad Hoc Networks Using Geographical
Location Information". Proc.IEEE International Conference on
Acoustics Speech and Signal Processing, pp 201-204, Apr 2003.
[4] H. Bettahar, A. Bouabdallah, and M. Alkubeily, "Efficient Key
Management Scheme for Secure Application level", IEEE sym. On
Computers and Communications, pp 489-497, July 2007.
[5] G.Valle, R.Cardenas, "Overview the Key Management in Adhoc
Networks", LCNS 3563, pp 397-406, Aug 2005.
[6] D.Huang, D.Medhi, "A Secure Group Key Management scheme for
Hierarchical Mobile Adhoc Networks", Adhoc Networks, pp 560-577,
June 2008.
[7] B.Kim, H.Cho, J. Lee, "Efficient Key Distribution Protocol for secure
Multicast Communication", LCNS 3043, pp 1007-1016, Apr 2004.
[8] Y. Challal, H. Seba, "Group Key Management Protocols: A novel
Taxonomy", International Journal of Information Technology pp 105-
118, 2005.
[9] L. Dondeti, S. Mukherjee, and A. Samal, "Secure one-to many group
communication sing dual encryption", IEEE sym. On Computers and
Communications, pp 1-25, Jul 1999.
[10] H. Bettahar, A. Bouabdallah, and Y. Challal, "An adaptive key
management protocol for secure multicast", Proc.IEEE International
Conference on Computer Communications and Networks, pp 190-
195, Oct 2002.
[11] M. Bouassida, I. Chrisment, and O. Festor, "An Enhanced Hybrid Key
Management Protocol for Secure Multicast in Ad Hoc Networks".
LCNS 3042, pp 725-742, Apr 2004.
[12] K.Rahman, R.Zaman, A.Reddy, " An Efficient DSDV routing Protocol
for Wireless Mobile Adhoc Networks and its Performance Comparison",
Proc. European Sym. On Computer Modeling and Simulation, pp 508-
511, Nov 2008.
[13] S. Mittra, "Iolus: A framework for scalable secure multicasting",
SIGCOMM, pages 277-288, 1997.
[14] Y. Challal, H. Bettahar, and A. Bouabdallah, "SAKM: A Scalable and
Adaptive Key Management Approach for Multicast Communications",
ACM SIGCOMM Computer Communication Review, pp 55-70, April
2004.
[15] M. Bouassida, I. Chrisment, and O. Festor, "Efficient Clustering for
Multicast Key Distribution in MANETs", LCNS 3462, pp 138-153, May
2005.
[16] M. Bouassida, I. Chrisment, and O. Festor, "Group Key Management in
Manets", International Journal of Network Security, pp 67-79, Jan 2008.
[17] M. Bouassida, I. Chrisment, and O. Festor "Efficient group key
management protocol in MANETs using multipoint relaying technique",
Proc.IEEE International Conference on Networking, pp 64, Apr. 2006.