Title :
A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks
Author :
Yu, F. Richard ; Tang, Helen ; Mason, Peter C. ; Wang, Fei
Author_Institution :
Dept. of Syst. & Comput. Eng., Carleton Univ., Ottawa, ON, Canada
fDate :
12/1/2010 12:00:00 AM
Abstract :
Hierarchical key management schemes would serve well for military applications where the organization of the network is already hierarchical in nature. Most of the existing key management schemes concentrate only on network structures and key allocation algorithms, ignoring attributes of the nodes themselves. Due to the distributed and dynamic nature of MANETs, it is possible to show that there is a security benefit to be attained when the node states are considered in the process of constructing a private key generator (PKG). In this paper, we propose a distributed hierarchical key management scheme in which nodes can get their keys updated either from their parent nodes or a threshold of sibling nodes. The dynamic node selection process is formulated as a stochastic problem and the proposed scheme can select the best nodes to be used as PKGs from all available ones considering their security conditions and energy states. Simulation results show that the proposed scheme can decrease network compromising probability and increase network lifetime in tactical MANETs.
Keywords :
military communication; mobile ad hoc networks; private key cryptography; stochastic processes; telecommunication network management; telecommunication security; PKG; distributed hierarchical key management scheme; dynamic node selection process; hierarchical identity based key management scheme; key allocation algorithms; military applications; network compromising probability; network lifetime; network structures; node states; parent nodes; private key generator; security benefit; sibling nodes; stochastic problem; tactical MANET; tactical mobile ad hoc networks; Ad hoc networks; Energy states; Markov processes; Mobile ad hoc networks; Peer to peer computing; Polynomials; Security; Hierarchical ID-based encryption; compromising probability; network lifetime; private key generator;
Journal_Title :
Network and Service Management, IEEE Transactions on
DOI :
10.1109/TNSM.2010.1012.0362