• Article
  • | |
  • Metrics
  • |
  • Reference [17]
  • |
  • Related [20]
  • |
  • Cited by [16]
  • | |
  • Comments
    Abstract:

    Many emerging mobile wireless applications depend upon secure group communication, in which a secure and efficient group rekeying algorithm is very important. In this paper, a rekeying algorithm named DGR (distributed group rekeying algorithm) is proposed, which is based on DGKMF (distributed group key management framework). DGR algorithm generates a group key with local secrete information, and is suitable for mobile ad hoc networks. In order to further reduce the communication complexity, the DGR algorithm is improved on by generating a cluster dynamically in the rekeying process, and the CDGR (cluster distributed group rekeying algorithm) is proposed. The security, correctness, and completeness of the two algorithms are discussed in this paper, and their message complexity costs are evaluated. Simulation results demonstrate that the two algorithms are better than other algorithms and protocols such as CKD, GDH v.2 and BD in the group rekeying success ratio and delay, and the CDGR is better than GDR in the group rekeying delay because it uses the cluster in the rekeying process.

    Reference
    [1]Perkins CE. Ad Hoc Networking. London: Addison-Wesley, 2001.
    [2]Zhou LD, Hass ZJ. Securing in ad-hoc networks. IEEE Networks, 1999,13(6):24~30.
    [3]Stajano F, Anderson R. The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Proc. of the 7th Int'l Workshop on Security Protocols. Berlin: Springler-Verlag, 1999. http:∥www.cl.ac.uk/~fms27/duckling/duckling.htm
    [4]Griffin S, DeCleene B, Dondeti L, Flynn R, Kiwior D, Olbert A. Hierarchical key management for mobile multicast members.Technical Report, Northrop Grumman Information Technology, 2002.
    [5]Basagni S, Herrin K, Bruschi D, Rosti E. Secure pebblenets. In: Proc. of the 2001 ACM Int'l Symp. on Mobile Ad Hoc Networking and Computing. New York: ACM Press, 2001. 156~163.
    [6]Hardjono T, Tsudik G. IP Multicast security: Issues and directions. Julho-Agosto: Annales de Telecom, 2000. 324~334.http://www.nr.no/~abie/Multicasting.htm
    [7]Moyer MJ, Rao JR, Rohatgi P. A survey of security issues in multicast communications. IEEE Network Magazine, 1999,13(1):12~23.
    [8]Wallner D, Harder E, Agee R. Key Management for Multicast: Issues and Architectures. Request for Comments (Informational)2627, Internet Engineering Task Force, 1999. http://www.faqs.org/rfcs/rfc2627.html
    [9]Kuang X, Hu H. Performance analysis of group key management protocol in mobile ad hoc network. Computer Engineering and Science, 2004,26(3):4~7 (in Chinese with English abstract).
    [10]Hietalahti M. Efficient key agreement for ad-hoc networks [MS. Thesis]. Espoo: Department of Computer Science and Engineering,Helsinki University of Technology, 2001.
    [11]Zhang C, DeCleene B, Kurose J, Towsley D. Comparison of inter-area rekeying algorithms for secure wireless group communications. Performance Evaluation, 2002,49(1-4): 1 ~20.
    [12]Carman DW. Constraints and approaches for distributed sensor network security. Technical Report, #00-010, NAI Labs, 2000.
    [13]Kuang X, Lu X. Secure group communications for mobile ad-hoc networks. Journal of Computer Research and Development,2004,41(4):704~710 (in Chinese with English abstract).
    [14]Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Advances in Cryptology-CRYPTO'99. Vol. 1666 of Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1999. 148~164.
    [15]Herzberg A, Jarecki S, Krawczyk H, Yung M. Proactive secret sharing or: How to cope with perpetual leakage. In: Advances in Cryptology-CRYPTO'95. Vol. 963 of Lecture Notes in Computer Science, London: Springer-Verlag, 1995. 339~352.
    [16]况晓辉,张念,胡华平.移动自组网络环境下组密钥管理协议性能分析.计算机工程与科学,2004,26(3):4~7.
    [17]况晓辉,胡华平,卢锡城.移动自组网络的组密钥管理框架.计算机研究与发展,2004,41(4):704~710.
    Comments
    Comments
    分享到微博
    Submit
Get Citation

况晓辉,朱培栋,卢锡城.移动自组网络分布式组密钥更新算法.软件学报,2004,15(5):757-766

Copy
Share
Article Metrics
  • Abstract:4773
  • PDF: 6157
  • HTML: 0
  • Cited by: 0
History
  • Received:April 10,2003
  • Revised:June 04,2003
You are the first2033450Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063