Affiliation:
1. Tunghai University
2. China University of Technology
3. Hsing Kuo University of Management
Abstract
Mobile ad-hoc networking (MANET) is a collection of mobile nodes that want to communicate to each others, but has no fixed links like wireless infrastructure networks to provide group applications and services. Therefore we need concern about providing each node with a secure and efficient key management system for dynamically discovering other nodes which can directly communicate with. Due to the network topology of an ad hoc network changes frequently and unpredictable, so the security of multicast routing becomes more challenging than the traditional networks. In this paper, we describe how any users in the multicast group can compose the group keys and propose a hierarchical group key management to securely multicast data from the multicast source to the rest of the multicast members in wireless ad hoc networks. This approach has a hierarchical structure where the group members are partitioned into rendezvous-location based clusters which can reduce the cost of key management. It not only provides the multicast routing information, but also fits the robustness of the wireless networks and reduces the overhead for the security management.
Publisher
Trans Tech Publications, Ltd.
Reference10 articles.
1. Vasudevan, V. Sukumar, R. , Scalable secure multicast using multi server approach for wireless environments., Control, Automation, Communication and Energy Conservation, INCACEC 2009, June 2009, pages 1-10.
2. Yi ling Wang, Balasubramaniam Srinivasan, Hybrid Group Key Management Scheme for Secure Wireless Multicast, 6th IEEE/ACIS International Conference on Computer and Information Science, (2007).
3. Chung Kei Wong; Gouda, M.; Lam, S.S.; Secure group communications using key graphs", Proceedings of the Third International Conference on Information Technology: New Generations (ITNG, 06), 2006, Page(s): 16 -21.
4. Yi ling Wang, Balasubramaniam Srinivasan, Efficient Key Management for Secure Wireless Multicast, Third International Conference on Convergence and Hybrid Information Technology, 2008 , Page(s): 1131 - 1136.
5. Gouda, M.G.; Chin-Tser Huang; Elnozahy, E.N.; Key trees and the security of Interval multicast, Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on , 2002 , Page(s): 467 -468.