Abstract
We present a lightweight network coding based key distribution scheme to secure communications in mobile ad hoc network. Our scheme only needs simple XOR network coding operations and message authentication codes to achieve data confidentiality and guarantee the integrity of the distributed keys, respectively. Security analysis shows the effectiveness of our scheme against eavesdropping and impersonation attacks as well as brute force attacks. The proposed scheme employs a cluster-based hierarchical network topology. Simulation analysis show that for key exchange between two nodes in the same cluster, the scheme achieves more than 95% key delivery ratio with an ignorable average delay of 2 m.s.; for key exchange between nodes in different clusters, 58% key delivery ratio is achieved with around 10 m.s. of average delay.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ahlswede, R., Cai, N., Li, S.-Y.R., Yeung, R.W.: Network Information Flow. IEEE Transactions on Information Theory 46(4), 1204–1216 (2000)
Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System (Extended Abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Li, B., Garcia-Luna-Aceves, J.J.: Tology Management in Ad Hoc Networks. In: Proc. of MOBIHOC 2003, pp. 129–140. ACM (2003)
Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005)
Dutta, R., Barua, R.: Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting. IEEE Transactions on Information Theory 54(5), 2007–2025 (2008)
Dong, J., Curtmola., S.R., Nita-Rotaru, C.: Toward Secure Network Coding in Wireless Networks: Threats and Challenges. In: Proc. of 4th Workshop on Secure Network Protocols (NPSEC 2008), pp. 33–38. IEEE (2008)
Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)
Gkantsidis, C., Rodriguez, P.: Network Coding for Large Scale Content Distribution. In: Proc. of INFOCOM 2005, pp. 2235–2245. IEEE (2005)
Gentry, C., Waters, B.: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171–188. Springer, Heidelberg (2009)
Huang, Y.-M., Yeh, C.-H., Wang, T.-I., Chao, H.-C.: Constructing Secure Group Communication over Wireless Ad Hoc Networks Based on a Virtual Subnet Model. IEEE Wireless Communications 14(5), 71–75 (2007)
Ingemarsson, I., Tang, D.T., Wong, C.K.: A Conference on Key Distribution System. IEEE Transactions on Information Theory 28(5), 714–720 (1982)
Jaggi, S., Langberg, M., Katti, S., Ho, T., Katabi, D., Médard, M.: Resilient Network Coding in the Presence of Byzantine Adversaries. In: Proc. of INFOCOM 2007, pp. 616–624. IEEE (2007)
Jiang, M., Li, J., Tay, Y.C.: Cluster Based Routing Protocol (CBRP): Functional Specification. In: Mobile Ad-hoc Network (MANET) Working Group, IETF (1998)
Liu, J., Du, R., Chen, J., He, K.: A Key Distribution Scheme Using Network Coding for Mobile Ad Hoc Network. Security and Communication Networks 5(1), 59–67 (2012)
Lima, L., Vilela, J.P., Oliveira, P.F., Barros, J.: Network Coding Security: Attacks and Countermeasures. Cryptography and Security, CoRR abs/0809.1366 (2008), http://arxiv.org/pdf/0809.1366v1.pdf
Li, S., Yeung, R., Cai, N.: Linear Network Coding. IEEE Transactions on Information Theory 49(2), 371–381 (2003)
Mao, Y., Sun, Y., Wu, M., Liu, K.J.R.: JET: Dynamic Join-Exit-Tree Amortization and Scheduling for Contributory Key Management. IEEE/ACM Transactions on Networking 14(5), 1128–1140 (2006)
Network Simulator-2 (2011), http://www.isi.edu/nsnam/ns
Oliveira, P.F., Barros, J.: Mobile Secret Key Distribution with Network Coding. In: Proc. of the International Conference on Security and Cryptography (SECRYPT 2007), pp. 171–174 (2007)
Oliveira, F., Barros, J.: Network Coding Protocols for Secret Key Distribution. IEEE Transactions on Information Forensics and Security 3(3), 414–423 (2008)
Rong, B., Chen, H.-H., Qian, Y., Lu, K., Hu, R.Q., Guizani, S.: A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study. IEEE Transactions on Vehicular Technology 58(1), 398–408 (2009)
Sangi, A.R.: Route Information Poisoning in MANETs: Analysis and Defenses. In: Proc. of Fourth IITA Conference (2010)
Sangi, A.R., Liu, J., Liu, Z.: Performance Comparison of Single and Multi-Path routing Protocol in MANET with Selfish Behaviors. Proc. of World Academy of Science, Engineering and Technology (WASET) 65, 828–832 (2010)
Steiner, M., Tsudik, G., Waidner, M.: Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel Distributed System 11(8), 769–780 (2000)
Vilela, J.P., Lima, L., Barros, J.: Lightweight Security for Network Coding. In: Proc. of ICC 2008, pp. 1750–1754. IEEE (2008)
Viega, J., Messier, M., Chandra, P.: Network Security with OpenSSL, 1st edn. O’Reilly, Cambridge (2002)
Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Xiao, Y., Shen, X., Du, D.-Z. (eds.) Wireless/Mobile Network Security, pp. 103–135. Springer (2006)
Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric Group Key Agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153–170. Springer, Heidelberg (2009)
Wu, Q., Qin, B., Zhan, L., Domingo-Ferrer, J.: Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm. IEEE/ACM Transactions on Networking (2012) ISSN : 1063-6692, doi:10.1109/TNET.2012.2208201
Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farràs, O.: Bridging Broadcast Encryption and Group Key Agreement. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 143–160. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, J., Sangi, A.R., Du, R., Wu, Q. (2013). Light Weight Network Coding Based Key Distribution Scheme for MANETs. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-38631-2_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38630-5
Online ISBN: 978-3-642-38631-2
eBook Packages: Computer ScienceComputer Science (R0)