Skip to main content
Erschienen in: Wireless Personal Communications 3/2016

02.09.2016

Improved Hierarchical Key Management Scheme (IHKMS) with Three Phase Technique for Ad-Hoc Networks

verfasst von: Osama S. Faragallah, S. F. El-Zoghdy

Erschienen in: Wireless Personal Communications | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This research presents an improved hierarchical key management scheme (IHKMS) with three phase technique for secure group communications in Mobile Ad-hoc Networks (MANETs). It extends two previously proposed models named enhanced hierarchical key agreement scheme (EHKMS) and EHKMS with three phase technique which suffer from two main problems. The first one which exists in both models is that, the main subgroup controller (L1-head) is heavily loaded and has a lot of responsibilities which may lead to its failure. The second problem that exists only in EHKMS is intrusion attacks which may appear in two aspects; frank intrusion and selfish attack. This problem is a fatal one which threatens the security of the system. The proposed IHKMS with three phase technique solves the above mentioned problems. First, it decreases the memory load on the main subgroup header to save its memory resources by distributing a major part of subgroup keys storage into the second level of subgroups headers. Second, it immunizes the IHKMS against intrusions by employing the three phase technique. Applying the three phase technique integrates a certification authentication system in addition to the hierarchal key system used in the IHKMS. The proposed IHKMS with three phase technique enhances EHKMS and EHKMS with three phase technique. It improves the system’s reliability in EHKMS, and EHKMS with three phase technique by minimizing the subgroup header’s load. Also, it overcomes the intrusion problem that exists only in EHKMS. On the other hand, the complexity of the proposed IHKMS with three phase technique is higher than that of EHKMS. This is anticipated result as the proposed model integrates the three phase technique with the IHKMS.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
2.
Zurück zum Zitat Cheng, Y., Huang, C., & Shi, W. (2007). Trusted dynamic source routing protocol. In Proceedings of IEEE international conference on wireless communications, networking and mobile computing (pp. 1632–1636). Cheng, Y., Huang, C., & Shi, W. (2007). Trusted dynamic source routing protocol. In Proceedings of IEEE international conference on wireless communications, networking and mobile computing (pp. 1632–1636).
3.
Zurück zum Zitat Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000) Mitigating routing mis-behavior in mobile ad hoc networks. In Proceedings of 6th annual international conference on mobile computing and networking (pp. 255–265). Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000) Mitigating routing mis-behavior in mobile ad hoc networks. In Proceedings of 6th annual international conference on mobile computing and networking (pp. 255–265).
4.
Zurück zum Zitat Buchegger, S., & Le Boudec, J. Y. (2002) Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes: Fairness In Dynamic Adhoc NeTwork). In Proceedings of international IEEE conference on mobile ad hoc networking and computing. Buchegger, S., & Le Boudec, J. Y. (2002) Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes: Fairness In Dynamic Adhoc NeTwork). In Proceedings of international IEEE conference on mobile ad hoc networking and computing.
5.
Zurück zum Zitat Miranda, H., & Rodrigues, L. (2005). Preventing selfishness in open mobile ad hoc networks. In Proceedings of international IEEE conference on wireless communication and networking Miranda, H., & Rodrigues, L. (2005). Preventing selfishness in open mobile ad hoc networks. In Proceedings of international IEEE conference on wireless communication and networking
6.
Zurück zum Zitat Madhavi, S., & Kim, T. H. (2008). An intrusion detection system in mobile adhoc networks. In Proceedings of international journal of security and its applications (vol. 2, no. 3). Madhavi, S., & Kim, T. H. (2008). An intrusion detection system in mobile adhoc networks. In Proceedings of international journal of security and its applications (vol. 2, no. 3).
7.
Zurück zum Zitat Balakrishnan, K., Deng, J., & Pramod, V. K. (2005). TWOACK: Preventing selfishness in mobile ad hoc networks. In Proceedings of international IEEE conference on wireless communication and networking. Balakrishnan, K., Deng, J., & Pramod, V. K. (2005). TWOACK: Preventing selfishness in mobile ad hoc networks. In Proceedings of international IEEE conference on wireless communication and networking.
8.
Zurück zum Zitat Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E. & Mouftah, H. (2010) AACK: Adaptive acknowledgment intrusion detection for MANET with node detection enhancement. In Proceedings of 24th international IEEE conference on advanced information networking and applications. Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E. & Mouftah, H. (2010) AACK: Adaptive acknowledgment intrusion detection for MANET with node detection enhancement. In Proceedings of 24th international IEEE conference on advanced information networking and applications.
9.
Zurück zum Zitat Arya, K. V., Vashistha, P. & Gupta, V. Three phase technique for intrusion detection in mobile ad hoc network. In Proceedings of Wireless Personal Communication (pp. 675–684). Arya, K. V., Vashistha, P. & Gupta, V. Three phase technique for intrusion detection in mobile ad hoc network. In Proceedings of Wireless Personal Communication (pp. 675–684).
10.
Zurück zum Zitat Huang, D. & Medhi, D. (2007). A secure key management scheme for hierarchical mobile ad hoc networks. Elsevier’s Ad Hoc Networks, 6(4), 560–577.CrossRef Huang, D. & Medhi, D. (2007). A secure key management scheme for hierarchical mobile ad hoc networks. Elsevier’s Ad Hoc Networks, 6(4), 560–577.CrossRef
14.
Zurück zum Zitat Xenakis, C., Panos, C., & Stavrakakis, I. (2011). A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Computers & Security, 30, 63–80.CrossRef Xenakis, C., Panos, C., & Stavrakakis, I. (2011). A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. Computers & Security, 30, 63–80.CrossRef
15.
Zurück zum Zitat Soliman, H. H., Hikal, N. A., & Sakr, N. A. (2012). A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. Egyptian Informatics Journal, 13, 225–238.CrossRef Soliman, H. H., Hikal, N. A., & Sakr, N. A. (2012). A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. Egyptian Informatics Journal, 13, 225–238.CrossRef
16.
Zurück zum Zitat Sen, J., Ukil, A., Bera, D., & Arpan Pal. A distributed intrusion detection system for wireless ad hoc networks. In Proceeding og 16th IEEE international conference on networks (ICON 2008), New Delhi, 12–14 Dec (pp. 1–6). Sen, J., Ukil, A., Bera, D., & Arpan Pal. A distributed intrusion detection system for wireless ad hoc networks. In Proceeding og 16th IEEE international conference on networks (ICON 2008), New Delhi, 12–14 Dec (pp. 1–6).
17.
Zurück zum Zitat Mitchell, R., & Chen, I.-R. (2014). A survey of intrusion detection in wireless network applications. Computer Communications, 42, 1–23.CrossRef Mitchell, R., & Chen, I.-R. (2014). A survey of intrusion detection in wireless network applications. Computer Communications, 42, 1–23.CrossRef
18.
Zurück zum Zitat Di Pietro, R., Guarino, S., Verde, N. V., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks—A survey. Computer Communications, 51, 1–20.CrossRef Di Pietro, R., Guarino, S., Verde, N. V., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks—A survey. Computer Communications, 51, 1–20.CrossRef
19.
Zurück zum Zitat Nadeem, A., & Howarth, M. P. (2014). An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Networks, 13, 368–380.CrossRef Nadeem, A., & Howarth, M. P. (2014). An intrusion detection & adaptive response mechanism for MANETs. Ad Hoc Networks, 13, 368–380.CrossRef
20.
Zurück zum Zitat Sen, S., & Clark, J. A. (2011). Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks, 55, 3441–3457.CrossRef Sen, S., & Clark, J. A. (2011). Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks, 55, 3441–3457.CrossRef
21.
Zurück zum Zitat Mishra, A., Nadkarni, K., & Patcha, A. (2004). Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications, 11(1), 48–60.CrossRef Mishra, A., Nadkarni, K., & Patcha, A. (2004). Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications, 11(1), 48–60.CrossRef
22.
Zurück zum Zitat Sen, S., & Clark, J. A. (2009). Intrusion detection in mobile ad hoc networks, Chapter 17 (pp. 427–454). Heidelberg: Springer. Sen, S., & Clark, J. A. (2009). Intrusion detection in mobile ad hoc networks, Chapter 17 (pp. 427–454). Heidelberg: Springer.
23.
Zurück zum Zitat Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5), 56–63.CrossRef Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5), 56–63.CrossRef
24.
Zurück zum Zitat Komninos, N., & Douligeris, C. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Journal of Ad Hoc Networks, 7, 171–182.CrossRef Komninos, N., & Douligeris, C. (2009). LIDF: Layered intrusion detection framework for ad-hoc networks. Journal of Ad Hoc Networks, 7, 171–182.CrossRef
25.
Zurück zum Zitat Cho, J.-H., & Chen, I.-R. (2011). Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Journal of Performance Evaluation, 68, 58–75.CrossRef Cho, J.-H., & Chen, I.-R. (2011). Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Journal of Performance Evaluation, 68, 58–75.CrossRef
26.
Zurück zum Zitat El-Zoghdy, S. F., & Asem, Y. M. (2011). Secure group re-keying using key inverses. Journal of High Speed Networks, 18(1), 47–68. El-Zoghdy, S. F., & Asem, Y. M. (2011). Secure group re-keying using key inverses. Journal of High Speed Networks, 18(1), 47–68.
27.
Zurück zum Zitat Mitrokotsa, A., Komninos, N., & Douligeris, C. (2007). Intrusion detection & response in ad-hoc networks. In Advances in Ad Hoc Network Security, International Journal on Computer Research (vol. 15, pp. 23–55). Nova Science Publishing Inc. Mitrokotsa, A., Komninos, N., & Douligeris, C. (2007). Intrusion detection & response in ad-hoc networks. In Advances in Ad Hoc Network Security, International Journal on Computer Research (vol. 15, pp. 23–55). Nova Science Publishing Inc.
28.
Zurück zum Zitat Cao, J., Liao, L., & Wang, G. (2006). Scalable key management for secure multicast communication in the mobile environment. Pervasive and Mobile Computing, 2(2), 187–203.CrossRef Cao, J., Liao, L., & Wang, G. (2006). Scalable key management for secure multicast communication in the mobile environment. Pervasive and Mobile Computing, 2(2), 187–203.CrossRef
29.
Zurück zum Zitat Jun, Z., Yo, Z., Fanyuan, M., Dawu, G., & Yingcai, B. (2006). An extension of secure group communication using key graph. Elsevier’s Information Sciences, 176, 3060–3078.MathSciNetCrossRef Jun, Z., Yo, Z., Fanyuan, M., Dawu, G., & Yingcai, B. (2006). An extension of secure group communication using key graph. Elsevier’s Information Sciences, 176, 3060–3078.MathSciNetCrossRef
30.
Zurück zum Zitat Ng, W. H. D., Howarth, M., Sun, Z., & Cruickshank, H. (2007) Dynamic balanced key tree management for secure multicast communications. IEEE Computers Transactions, 56(5), 590–605. Ng, W. H. D., Howarth, M., Sun, Z., & Cruickshank, H. (2007) Dynamic balanced key tree management for secure multicast communications. IEEE Computers Transactions, 56(5), 590–605.
31.
Zurück zum Zitat Peyravian, M., Matyas, S. M., & Zunic, N. (1999). Decentralized group key management for secure multicast communications. Elsevier’s Computer Communications, 22, 1183–1187.CrossRef Peyravian, M., Matyas, S. M., & Zunic, N. (1999). Decentralized group key management for secure multicast communications. Elsevier’s Computer Communications, 22, 1183–1187.CrossRef
32.
Zurück zum Zitat Rafaeli, S., & Hutchinson, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309–329.CrossRef Rafaeli, S., & Hutchinson, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys, 35(3), 309–329.CrossRef
33.
Zurück zum Zitat Chan, X., Ma, B. N. W., & Yang, C. (2007). M-CLIQUES: Modified CLIQUES key agreement for secure multicast. Elsevier’s Computers and Security, 26, 138245. Chan, X., Ma, B. N. W., & Yang, C. (2007). M-CLIQUES: Modified CLIQUES key agreement for secure multicast. Elsevier’s Computers and Security, 26, 138245.
34.
Zurück zum Zitat Jacoby, G. A., & Davis, N. J. (2007). Mobile host-based intrusion detection and attack identification. IEEE Wireless Communications, 14(4), 53–60.CrossRef Jacoby, G. A., & Davis, N. J. (2007). Mobile host-based intrusion detection and attack identification. IEEE Wireless Communications, 14(4), 53–60.CrossRef
35.
Zurück zum Zitat Lauf, A., Peters, R. A., & Robinson, W. H. (2010). A distributed intrusion detection system for resource-constrained devices in ad hoc networks. Ad Hoc Networks, 8(3), 253–266.CrossRef Lauf, A., Peters, R. A., & Robinson, W. H. (2010). A distributed intrusion detection system for resource-constrained devices in ad hoc networks. Ad Hoc Networks, 8(3), 253–266.CrossRef
36.
Zurück zum Zitat Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks,. doi:10.1155/2013/167575. Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks,. doi:10.​1155/​2013/​167575.
37.
Zurück zum Zitat Wang, W., Man, H., & Liu, Y. (2009). A framework for intrusion detection systems by social network analysis methods in ad hoc networks. Wiley Security and Communication Networks, 2(6), 669–685. Wang, W., Man, H., & Liu, Y. (2009). A framework for intrusion detection systems by social network analysis methods in ad hoc networks. Wiley Security and Communication Networks, 2(6), 669–685.
38.
Zurück zum Zitat Razak, S. A., Furnell, S. M., Clarke, N. L., & Brooke, P. J. (2008). Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks, 6(7), 1151–1167.CrossRef Razak, S. A., Furnell, S. M., Clarke, N. L., & Brooke, P. J. (2008). Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks, 6(7), 1151–1167.CrossRef
39.
Zurück zum Zitat Ma, C., & Fang, Z. (2009). A novel intrusion detection architecture based on adaptive selection event triggering for mobile ad-hoc networks. In Proceedings of IEEE 2nd international symposium on intelligent information technology and security informatics (pp. 198–201), January 2009. Ma, C., & Fang, Z. (2009). A novel intrusion detection architecture based on adaptive selection event triggering for mobile ad-hoc networks. In Proceedings of IEEE 2nd international symposium on intelligent information technology and security informatics (pp. 198–201), January 2009.
40.
Zurück zum Zitat Elboukhari, M., Azizi, M., & Azizi, A. (2015). Intrusion detection systems in mobile ad hoc networks: state of the art. International Journal on Computational Sciences & Applications (IJCSA), 5(2), 27–36.CrossRef Elboukhari, M., Azizi, M., & Azizi, A. (2015). Intrusion detection systems in mobile ad hoc networks: state of the art. International Journal on Computational Sciences & Applications (IJCSA), 5(2), 27–36.CrossRef
41.
Zurück zum Zitat Wang, N., & Fang, S. (2007). A hierarchical key management scheme for secure group communications in mobile ad hoc networks. Journal of Systems and Software, 80(10), 1667–1677.CrossRef Wang, N., & Fang, S. (2007). A hierarchical key management scheme for secure group communications in mobile ad hoc networks. Journal of Systems and Software, 80(10), 1667–1677.CrossRef
42.
Zurück zum Zitat Pieprzyk, J., & Li, C.-H. (2000). Multiparty key agreement protocols. IEE Proceedings Computers and Digital Techniques, 147(4), 229–236.CrossRef Pieprzyk, J., & Li, C.-H. (2000). Multiparty key agreement protocols. IEE Proceedings Computers and Digital Techniques, 147(4), 229–236.CrossRef
43.
Zurück zum Zitat Elaskily, M. A. (2013). Investigation of security techniques for mobile ad hoc networks. MSc Thesis, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University. Elaskily, M. A. (2013). Investigation of security techniques for mobile ad hoc networks. MSc Thesis, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University.
Metadaten
Titel
Improved Hierarchical Key Management Scheme (IHKMS) with Three Phase Technique for Ad-Hoc Networks
verfasst von
Osama S. Faragallah
S. F. El-Zoghdy
Publikationsdatum
02.09.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3529-9

Weitere Artikel der Ausgabe 3/2016

Wireless Personal Communications 3/2016 Zur Ausgabe

Neuer Inhalt