Skip to main content
Log in

Enhanced Security Using Cluster Based Certificate Management and ECC-CRT Key Agreement Schemes in Mobile Ad hoc Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the increasing demand of wireless networks, in particular Mobile Ad hoc Networks (MANET), security over such networks has become one of the major issues concerned extensively. The security solutions proposed by various researchers failed in considering mobility aware node to node communication in the infrastructure-less ad hoc networks. Besides, the certificates as well as key management and verification complexities associated in MANET with a Public Key Infrastructure (PKI) framework are significantly large. This paper addresses the issue of certificate assignment and key management of secure group communications over MANET. We propose a novel certificate assignment strategy in order to significantly reduce the complexity of managing the PKI framework. The strategy involves partitioning the entire network into a number of cluster regions, and the assignment of region-specific certificates to a node resident in a cluster. We further proposed a secure key agreement scheme based on Elliptic Curve Cryptosystems (ECC) and the Chinese remainder theorem (CRT) to eliminate the security flaws and provide better security requirements. The proposed ECC-CRT key agreement scheme resists the know security attacks and provides authenticated group communication with less complexities and computational cost. The performances of proposed schemes are evaluated by simulation analysis and when compared with existing schemes, our schemes have the following advantages. (1) Simple to execute the certificate assignment and key agreement phases. (2) Easy to address dynamic rekeying when a node is added into or evicted from a cluster. (3) Efficient secret key updating scheme. (4) Secure against some potential security attacks. (5) Constant storage requirement for public and secret parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Fan, Y., Yulan, Z., & Ping, X. (2015). An overview of ad hoc network security. Communications in Computer and Information Science, 557, 129–137.

    Article  Google Scholar 

  2. Cho, J. H., Chan, K. S., & Chen, I. R. (2013). Composite trust-based public key management in mobile ad hoc networks. In ACM 28th Symposium on Applied Computing, Coimbra, Portugal.

  3. Huang, J., & Nicol, D. (2009). A calculus of trust and its application to PKI and identity management. In Proceedings of 8th Symposium on Identity and Trust on the Internet.

  4. Ferdous, R., Muthukkumarasamy, V. & Sithirasenan, E. (2011). Trust-based cluster head selection algorithm for mobile ad hoc networks. In Proceedings of International Joint Conference on IEEE Trust Com.

  5. Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transaction on Vehicular Technology, 63(9), 4647–4658.

  6. Liu, K., Abu-Ghazaleh, N. & Kang, K. (2007). Location verification and trust management for resilient geographic routing. Journal of parallel and distributed computing, 67(2), 215–228.

    Article  MATH  Google Scholar 

  7. Hegland, A. M., Winjum, E., Rong, C., & Spilling, P. (2006). A survey of key management in ad hoc networks. In IEEE Communication Surveys and Tutorials (Vol. 8(3), pp. 48–66, Third Quarter).

  8. Zhou, L., & Haas, Z. J. (1999). Securing ad hoc networks. IEEE Network Magazine, 13(6), 24–30.

    Article  Google Scholar 

  9. Zhou, L., Cchneider, B., & Van Renesse, R. (2002). COCA: A secure distributed online certification authority. ACM Transactions on Computer Systems, 20(4), 329–368.

    Article  Google Scholar 

  10. Chan, H., Gligor, V., Perrig, A., & Muralidharan, G. (2005). On the distribution and revocation of cryptographic keys in sensor networks. IEEE Transactions on Dependable and Secure Computing, 2(3), 233–247.

    Article  Google Scholar 

  11. Yi, P., Dai, Z., Zhong, Y., & Zhang, S. (2005). Resisting flooding attacks in ad hoc networks. In Proceedings of International Conference Information Technology: Coding and Computing (Vol. 2, pp. 657–662).

  12. Kannhavong, B., Nakayama, H., Jamalipour, A., Nemoto, Y., & Kato, N. (2007). A survey of routing attacks in MANET. IEEE Wireless Communication Magazine, 14(5), 85–91.

    Article  Google Scholar 

  13. Arboit, G., Crepeau, C., Davis, C. R., & Maheswaran, M. (2008). A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Network, 6(1), 17–31.

    Article  Google Scholar 

  14. Clulow, J., & Moore, T. (2006). Suicide for the common good: A new strategy for credential revocation in self-organizing systems. ACMSIGOPS Operating Systems Rev., 40(3), 18–21.

    Article  Google Scholar 

  15. Park, K., Nishiyama, H., Ansari, N., & Kato, N. (2010). Certificate revocation to cope with false accusations in mobile ad hoc networks. In Proceedings of IEEE 71st Vehicular Technology Conference (VTC’10).

  16. Kim, S. (2016). Effective certificate revocation scheme based on weighted voting game approach. IET Information Security, 10(4), 180–187.

    Article  Google Scholar 

  17. Liu, W., Nishiyama, H., Ansari, N., & Kato, N. (2011). A study on certificate revocation in mobile ad hoc network. In Proceedings of IEEE International Conference on Communications (ICC).

  18. Liu, W., Nishiyama, H., Ansari, N., Yang, J., & Kato, N. (2013). Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. In IEEE Transactions on parallel and distributed systems (Vol. 24(2)).

  19. Luo, H., Kong, J., Zerfos, P., Lu, S., & Zhang, L. (2004). URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking, 12(6), 1049–1063.

    Article  Google Scholar 

  20. Joux, A. (2000). A one round protocol for tripartite Diffie–Hellman. In Proceedings ANTS IV, LNCS 1838 (pp. 38594). Springer, Berlin.

  21. Barua, R., Dutta, R., & Sarkar, P. (2003). Extending Joux’s protocol to multi party key agreement. In Indocrypt3, LNCS 2904 (pp. 20517).

  22. Anton E., & Duarte, O. (2002). Group key establishment in wireless ad hoc networks. In Workshop on Quality of Service and Mobility.

  23. Li, X. Y., Wang, Y., & Frieder, O. (2002). Efficient hybrid key agreement protocol for wireless ad-hoc networks. In IEEE International Conference on Computer Communications and Networks.

  24. Yasinsac, A., Thakur, V., Carter, S., & Cubukcu, I. (2002). A family of protocols for group key generation in ad hoc networks. In IASTED Conference on Communication and Computer Networks.

  25. Balachandran, R., Ramamurthy, B., Zou, X., & Vinodchandran, N. (2005). CRTDH: An efficient key agreement scheme for secure group communications in wireless ad hoc networks. In Proceedings of lCC 2005 (Vol. 2, pp. 1123–1127).

  26. Harn, L., & Lin, C. (2014). Efficient group Diffie–Hellman key agreement protocols. Computers & Electrical Engineering, 40(6), 1972–1980.

    Article  Google Scholar 

  27. Akl, S. G., & Taylor, P. D. (1983). Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1(3), 239–248.

    Article  Google Scholar 

  28. Das, A. K., Paul, N. R., & Tripathy, L. (2012). Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences, 209, 80–92.

    Article  MathSciNet  MATH  Google Scholar 

  29. Lo, J.-W., Hwang, M.-S., & Liu, C.-H. (2011). An efficient key assignment scheme for access control in a large leaf class hierarchy. Information Sciences, 181, 917–925.

    Article  MATH  Google Scholar 

  30. Zhuang, Y., Gulliver, T. A. & Coady, Y. (2013). On planar tessellations and interference estimation in wireless ad-hoc networks. IEEE Wireless Communication Letters, 2(3), 331–334.

    Article  Google Scholar 

  31. Fan, P., Li, G., Cai, K., & Letaief, K. B. (2007). On the geometrical characteristic of wireless ad-hoc networks and its application in network performance analysis. IEEE Transaction on Wireless Communications, 6(4), 1256–1265.

    Article  Google Scholar 

  32. Ko, Y. B., & Vaidya, N. H. (1999). Geocasting in mobile ad hoc networks: Location-based multicast algorithms. In Proceedings of IEEE WMCSA.

  33. Janani, V. S., & Manikandan, M. S. K. (2015). CRT-KM: Chinese remainder theorem based key management scheme for securing ad-hoc networks. In IEEE International Conference on SPICES’15 (pp 1–5).

  34. Magliveras, S., Wei, W. & Zou, X. (2008). Notes on the CRTDH group key agreement protocol. In The 28th International Conference on Distributed Computing Systems Workshops.

  35. Barua, R., Dutta, R. & Sarkar, P. (2003). Extending Joux’s protocol to multi party key agreement. In Indocrypt’03, LNCS 2904 (pp.205–217). Springer, Berlin.

Download references

Acknowledgements

This research is supported by All India Council for Technical Education (AICTE), Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. S. Janani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Janani, V.S., Manikandan, M.S.K. Enhanced Security Using Cluster Based Certificate Management and ECC-CRT Key Agreement Schemes in Mobile Ad hoc Networks. Wireless Pers Commun 97, 6131–6150 (2017). https://doi.org/10.1007/s11277-017-4830-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4830-y

Keywords

Navigation