Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

A REVIEW ON EFFICIENT KEY MANAGEMENT SCHEMES FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS, Lecture notes of Wireless Sensor Networks

study on various key management schemes in mobile ad hoc networks and wireless sensor networks

Typology: Lecture notes

2016/2017

Uploaded on 12/14/2017

krishna-priya-chakir
krishna-priya-chakir 🇮🇳

2 documents

1 / 12

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
International Journal of Computer Engineering and Applications, Volume V, Issue I, Jan 14
C.Krishna Priya and Prof.B.Satyanarayana 13
A REVIEW ON EFFICIENT KEY MANAGEMENT SCHEMES FOR
SECURE ROUTING IN MOBILE AD HOC NETWORKS
C.Krishna Priya1, Prof.B.Satyanarayana 2
1Research Scholar, Department of Computer Science & Technology, Sri Krishnadevaraya University,
Anantapur
2Professor, Department of Computer Science & Technology, Sri Krishnadevaraya University, Anantapur
krishnapriyarams@gmail.com, bachalasatya@yahoo.com
ABSTRACT:
Mobile Ad Hoc Networks (MANETs) have become ubiquitous in revolution of computing as
they are suitable for on demand communication scenarios. However, they are vulnerable to
attacks due to their multi-hop, dynamic, mobility and resource constrained nature. It is the
most sensitive issue faced by MANETs. Especially, it is so in the absence of key management
system. Therefore reliable key management scheme is indispensable to secure communication
between the nodes in MANET besides ensuring authentication, non repudiation,
confidentiality and integrity. Key management schemes play a pivotal role in distributing keys
among routing protocol, and participating nodes in communication. As the network lacks
infrastructure and central server, efficient key management is a challenging and open
problem to be addressed. Moreover nodes in MANET are dynamically configured without a
fixed topology which causes less than ideal trust relationship among nodes. As a matter of fact
every node in the network plays a role of an intermediate router. This makes the nodes to be
more responsible, reliable and able to participate in key management schemes for robust,
highly efficient and secure communication. The knowledge of the present state-of-the-art on
efficient key management in MANETs can help in securing networks and move on to further
enhancements in the area. Towards this end, in this paper, we analyze various key
management schemes and evaluate them in terms of their utility, and performance in the real
world networks.
KEYWORDS - Mobile Ad Hoc Networks, secure routing, key management schemes
[1] INTRODUCTION
MANET is an infrastructure less network which is established automatically on demand. It
is a set of wireless nodes that are configured automatically on the fly thus making it suitable
candidate as it is useful in emergency situations [1], [2]. In other words it is a multi-hop
communication network organized temporarily with nodes that have receivers and transmitters [3].
The topology of network is dynamic which is created and modified on the fly [4]. MANET
supports many routing protocols such as Dynamic MANET On-demand routing protocol (DYMO),
Optimized Link State Routing protocol (OLSR), Destination Sequenced Distance Vector (DSDV),
Dynamic Source Routing (DSR) and Ad Hoc On-demand Vector Routing (AODV). Mobility is the
fundamental difference between other networks and MANET [5]. Wireless Sensor Network (WSN)
traffic also can be relayed over MANET. It does mean that WSN communications are possible
between devices of MANET [6]. MANET supports TCP/IP protocol to integrate communication
with wired networks as well [1]. Every node in MANET acts as a host in the network and also
pf3
pf4
pf5
pf8
pf9
pfa

Partial preview of the text

Download A REVIEW ON EFFICIENT KEY MANAGEMENT SCHEMES FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS and more Lecture notes Wireless Sensor Networks in PDF only on Docsity!

International Journal of Computer Engineering and Applications, Volume V, Issue I, Jan 14

A REVIEW ON EFFICIENT KEY MANAGEMENT SCHEMES FOR

SECURE ROUTING IN MOBILE AD HOC NETWORKS

C.Krishna Priya^1 , Prof.B.Satyanarayana 2

(^1) Research Scholar, Department of Computer Science & Technology, Sri Krishnadevaraya University, Anantapur (^2) Professor, Department of Computer Science & Technology, Sri Krishnadevaraya University, Anantapur krishnapriyarams@gmail.com, bachalasatya@yahoo.com

ABSTRACT:

Mobile Ad Hoc Networks (MANETs) have become ubiquitous in revolution of computing as they are suitable for on demand communication scenarios. However, they are vulnerable to attacks due to their multi-hop, dynamic, mobility and resource constrained nature. It is the most sensitive issue faced by MANETs. Especially, it is so in the absence of key management system. Therefore reliable key management scheme is indispensable to secure communication between the nodes in MANET besides ensuring authentication, non repudiation, confidentiality and integrity. Key management schemes play a pivotal role in distributing keys among routing protocol, and participating nodes in communication. As the network lacks infrastructure and central server, efficient key management is a challenging and open problem to be addressed. Moreover nodes in MANET are dynamically configured without a fixed topology which causes less than ideal trust relationship among nodes. As a matter of fact every node in the network plays a role of an intermediate router. This makes the nodes to be more responsible, reliable and able to participate in key management schemes for robust, highly efficient and secure communication. The knowledge of the present state-of-the-art on efficient key management in MANETs can help in securing networks and move on to further enhancements in the area. Towards this end, in this paper, we analyze various key management schemes and evaluate them in terms of their utility, and performance in the real world networks.

KEYWORDS - Mobile Ad Hoc Networks, secure routing, key management schemes

[1] INTRODUCTION

MANET is an infrastructure less network which is established automatically on demand. It

is a set of wireless nodes that are configured automatically on the fly thus making it suitable

candidate as it is useful in emergency situations [1], [2]. In other words it is a multi-hop

communication network organized temporarily with nodes that have receivers and transmitters [3].

The topology of network is dynamic which is created and modified on the fly [4]. MANET

supports many routing protocols such as Dynamic MANET On-demand routing protocol (DYMO),

Optimized Link State Routing protocol (OLSR), Destination Sequenced Distance Vector (DSDV),

Dynamic Source Routing (DSR) and Ad Hoc On-demand Vector Routing (AODV). Mobility is the

fundamental difference between other networks and MANET [5]. Wireless Sensor Network (WSN)

traffic also can be relayed over MANET. It does mean that WSN communications are possible

between devices of MANET [6]. MANET supports TCP/IP protocol to integrate communication

with wired networks as well [1]. Every node in MANET acts as a host in the network and also

A Review on Efficient Key Management Schemes for Secure Routing in Mobile Ad hoc Networks

router which can cooperate in communication [7]. As MANET topology is dynamic in nature

which makes the procedure of routing more difficult and vulnerable to Denial of Service (DoS)

attacks such as flooding which results in network congestion [8]. MANETs are vulnerable to

attacks such as location disclosure, black hole, replay, work hole, blackmail, denial of service and

routing table poisoning.

Secure key management is essential in MANETs to protect sensitive communications in the

network besides withstanding various kinds of attacks specified earlier. The key management

protocols are classified into many types as shown in figure 1.

Fig. 1 – Classification of key management approaches

Pairwise key approach is the approach in which key server provides pairwise keys to every

participant. One such model is GKMP. Apart from pairwise key the participants also know group

key and group key encryption key. Secure Locks is a key management protocol where a key server

uses only one broadcast to make a new group key or change existing one for all members in the

group. Hierarchy of keys approach is most efficientbut has tradeoff with storage. Here, in addition

to pairwise keys, the key server also shares keys with subgroups. Ring based cooperation is found

in CLIQUES protocol. It treats group members as controllers. One of the controllers collects

contributions from group members and then adds its own contribution. Afterwards it broadcasts it

to all group members to enable them generate group key. In hierarchical based cooperation a

structure is followed to group members. For instance STR protocol uses a tree structure that is used

in the cooperative communications. Broadcast based cooperation has fixed number of rounds. In

BD protocol [10] intermediate values are broadcasted to all participants and the load is shared

across parties. Based on the way clusters are formed the decentralized approaches are named static

clustering and dynamic clustering. A consequence based classification of attacks in MANET

includesdenial of service, sleep deprivation, selfishness, network partition, routing loops, and black

hole [11]. Reputation Trust (RT) model is proposed by Rizivi et al. in order to increase credibility

of nodes and reduce malicious behavior in MANET [12].

A Review on Efficient Key Management Schemes for Secure Routing in Mobile Ad hoc Networks

As summarized in figure 3, the components in multifense security solution belong to either

link-layer security solutions or network layer security solutions. Secure ad hoc routing, proactive

protection throughmessage authentication primitives, secure packet forwarding, reactive

protection through detection and reaction, source routing, link-state routing, distance vector

routing, misbehavior detection, misbehavior reaction are the solutions that can be made in

network layer. Whereas the link layer security solutions include using next generation WEP,

altering cryptographic primitives to fix loop holes. In this paper we provide the present state of

the art with respect to key management schemes. Our contribution in this paper is the survey of

various key management schemes existed for security MANET communications. The remainder

of the paper is structured as follows. In section II, we review literature on key management

schemes in MANETs. In section III we evaluate the schemes that have been reviewed while

section IV concludes the paper.

[2] KEY MANAGEMENT SCHEMES FOR MANETs

This sectionreviews availablekey management schemesfor secure routing in mobile ad hoc

networks. It focuses on the cluster based key management schemes, threshold secret sharing,

besides many other key management schemes that are suitable for various MANET applications in

varied mobility scenarios.

Cluster Based Key Management for MANET

Hai-tao [14] proposed cluster based key management scheme. It is builtin a distributed

network as soon as the network is initialized. The network is divided into clusters with cluster

head (CH) in each cluster. At the time of initialization CH generates share key for the cluster.

The shadow of cluster key is securely distributed to every other node in the cluster through

nonce. CH is also capable of determining whether a node originally joins cluster or comes from

other cluster (roaming node). If that is a roaming node, CH gets its history through its old CH

node and then makes a decision to allow the node or deny it. This key management scheme is

proved to be efficient, secure, fault tolerant and expansive in nature.

Threshold Secret Sharing

Cho et al. [15] proposed a secure mechanism for key management. They achieved it

throughregeneration of Cryptographically Generated Addresses (CGA). The CGA regeneration is

done using threshold secret sharing. They considered MANET with IP v6 addressing scheme.

Certificate Authorities are not used in MANETs. Instead of CA Threshold Secret Sharing (TSS)

is used. The TSS facilitates dividing of cryptographic primitives into n number of pieces and

associatesthem with n participants. Out of the n pieces if t number of pieces are gathered it is

possible to establish secret data. However, if t-1 pieces are gathered it is impossible to reconstruct

secret data. As the secret data is distributed it gives more security. For secure neighbor discovery

here is based on CGA and digital signature. The CGA format is as shown in figure 4.

International Journal of Computer Engineering and Applications, Volume V, Issue I, Jan 14

Fig. 4 – Format of CGA [15]

When a private key is compromised, the CGA regenerates address. The regeneration

process is done based on TSS which provides certificate issuing service. The TSS mechanism can

help nodes to identify compromised nodes in the network. As per this security mechanism each

node in MANET can have a secret share, public key pair and a certificate. Without the presence

of CAs, this mechanism obtains certificates using the TSS mechanism. Authentication of a sender

and the message is done by the security mechanism. Public key cryptography, IP v6 and CGA

work together to make the security more robust to attacks.The security mechanism has provision

for preventing brute-force attacks. This approach is capable of providing fool proof security.CGA

can also prevent IP address spoofing attack.

Threshold ID-Based Public-Key Management

A threshold ID based public key management scheme was proposed by Deng et al. [16].

The nodes initially existed in MANET generate security keys in collaborative fashion. The keys

are not kept in any single node. An assumption made in this scheme is that each node in the

network has a unique ID. The whole system private key is made up of all partial keys of all nodes

in the network. Each node obtains partial system private key with respect to its own identity. A

part of system private key is shared to each node based on the ID of the node in the network. A

threshold is used nodes while generating private keys of other nodes. To the given identity a set

of nodes together can generate security key. The generated secret keys are securely transmitted.

While sending a request message, the requesting node is supposed to present self generated

public key which is temporary. Such public key is used by t issuing nodes.

Public Key Management Scheme for MANETs

Yuh-Min Tseng [17] proposed a scheme for key management in MANETs. This scheme

has two phases namely initial phase and certificate distribution phase. In the first phase the

MANET is established using cluster-based networking where the nodes form clusters with cluster

heads. In the second phase actually takes care of certificate distribution that will ensure secure

International Journal of Computer Engineering and Applications, Volume V, Issue I, Jan 14

is with MANET nodes. Here secure key distribution is made possible through transitive trust

among all participating nodes in the communication. Non-hierarchical applications of MANET

can also use the key management scheme proposed which works in high mobility environment.

The security is initiated trusted authority by distributing private key shares to t + 1 node. Private

Key shares are associated with identity keys that cannot be changed by nodes participating in

secure communications. Proposed a scheme specially meant for MANETs which are used in

military applications or such emergency applications. This scheme supports medium mobility

support. The scheme is very secure. A Trusted Authority (TA) is part of the scheme. The nodes in

MANET are provided private key shares which are from CA. The TA coordinates the security

mechanism. Within two consecutive share refreshing processes, t+1 CA nodes cannot be

compromised by a mobile attacker. Thus it provides fool proof security.

Vennila and Duraisamy [19] proposed a multi-level group key management scheme. Their

scheme is used for secure multicasting in MANETs. The technique works in hierarchical fashion

by giving priority to cluster heads over cluster members. Cluster heads (CHs) are formed based

on the highest bandwidth availability and residual energy. The cluster head which has been

elected acts as group leader (GL) for multicasting. One way function chain is used to generate

keys. Using shuffle algorithm, key distribution is done. Assuming the presence of attackers,

experiments are made in terms of delivery ratio, drop of packets, energy, and resilience. This

scheme is energy efficient and improves packet delivery ratio.

Lakshmi, Sajid and Ramana [20] studied energy efficiency and security in MANETs. They

have provided details of various protocols such as Ad Hoc On-demand Vector Routing (AODV),

Temporally Ordered Routing (TORA), Dynamic Source Routing (DSR), and Destination-

Sequenced Distance Vector protocol (DSDV). Yang et al. [21] proposed identity – based

broadcast encryption (IBBE) for efficient key management. The solution is lightweight and fast

key agreement scheme. The scheme combines bilinear map and identity – based cryptosystem to

achieve efficient group key agreement. The salient feature of the scheme is that member of a

group has broadcasting capabilities. Each member will be able to find valid receivers and sends

messages securely.

An anonymous secure routing using cryptography for MANETs was proposed by Aghaie

and Adibnia [22]. The authors built a protocol to demonstrate the efficiency of the new security

model they proposed. Their empirical results revealed that in the presence of latency the scheme

achieved improved latency. In the presence of high traffic load, the scheme revealed significant

improvement in data packet latency. Shobha and Jadhav [23] studied security problems in

networks and proposed a scheme for secure communication in wireless networks. From the

simulation experiments the scheme is proved to be effective as it could improve throughput

besides being cost effective. Labbai and Rajani [24] proposed a secure group key management

protocol that is based on message authentication code. The proposed scheme is named as variable

bit rate on-demand routing protocol (VBOR). The message authentication code works in such a

way that it does not allow malicious nodes to get messages. Only group members who know

A Review on Efficient Key Management Schemes for Secure Routing in Mobile Ad hoc Networks

MAC value can get messages. Residual energy of the nodes is considered for making this scheme

to ensure the proposed scheme is energy efficient.

Pandya and Srivastava [25] studied the AODV protocol and made an extension to it. With

this they concluded that the key management schemes can be avoided by extending AODV

protocol efficiently. The reason behind is that the AODV is a popular routing protocol for mobile

networks and that can accommodate more secure communication with some changes. Digital

signature and secure hash algorithm are the two techniques used to improve security with AODV.

Devaraju and Ganapathi [26] proposed a QoS based secure multicast key distribution

inMANETs. A dynamic clustering approach is followed in order to achieve this. The

methodology used to distribute key includes DSDV [27] and OMCT integration, then enhancing

the integration, MDSDV [28] and CBMT, and efficient CBMT. The authors focused on phase 4

and achieved reduction of packet drop rate, end to end delay besides improving key delivery ratio

and reduction of energy consumption. Sanghavi and Tada [29] proposed cluster based topology

based secure key distribution scheme which is based on cryptographic function and network

coding approaches. This scheme is secure and robust which incurs less communication cost. Zhu

et al. [30] proposed an efficient group key management scheme named “GKMPAN” which will

improve scalability, efficiency, and partially stateless.

[3] DISCUSSION OF SCHEMES

The PKI based scheme proposed by Capkun et al. [18] avoids the usage of CA and third

party. Instead they use self-singed certificates. For room meeting scenarios the suitable key

management scheme is the one proposed by which makes use of a common password. Instead of

using the password directly, it is derived from a secret key. This provision is for preventing brute

force attacks. It also exhibits two party key exchange and group key exchange. For master slave

relationships proposed a scheme in which the master nodes exchange shared keys to slave nodes

then the slaves use common secret key to authenticate master node. Thus the communication takes

place securely. When all the participants are in the same physical space, the scheme proposed by is

suitable. In this approach a MAC is attached to each packet by the sender. The receiver waits until

all packets are buffered. Then the receiver takes the key disclosed by the sender thus it reduces one

MAC operation for each outgoing packet. For reliable communication almost all schemes use pre-

established key management schemes. Presented a scheme suitable for military operations. For

complete security it does not use a single CA. Instead it makes use of multiple replicated CAs at

various nodes arbitrarily. It can tolerate up to t compromised CA nodes. This is because it needs

t+1 partial signatures are required in order to break it. Two protocols are used by the scheme

proposed by Yuh-Min Tseng [17] for ensuring security in MANET. Collaborative key generation is

used by in their scheme. It is a threshold public key management scheme. Cho et al. [15] used TSS

for Cryptographically Generated Addresses (CGA) that ensures unbreakable security in MANET.

The scheme of cluster based and provides efficient, fault tolerant and expandable key management

scheme. Table1 summarizes all the key management schemes applied for MANETs.

A Review on Efficient Key Management Schemes for Secure Routing in Mobile Ad hoc Networks

and Tada [29]

topology based secure key distribution

method and network coding approach

impersonation attacks, eavesdropping, authentication and confidentiality, less communication overhead

distribution has not been evaluated

made in cluster- based ad hoc hierarchical network topology

Deng, Mukharji and Agarwal[ 6]

Threshold and identity based key management

Distributed key management and authentication

Saves network bandwidth, and computational power besides providing end-to-end confidentiality and authenticity

N/A Distributed key generation and identity based Authentication is the two important features of the research. Zhu et al. [30]

GKMPAN Probabilistic key sharing scheme.

Efficiency, scalability (with less revoked nodes), and partially stateless

It has scalability problem especially when number of revoked nodes exist

It is a group key management protocol evaluated in MANETs. Table 1 – Summary of key management schemes for MANETs

[4] CONCLUSIONS

In this paper we studied key management schemes in MANET that provide secure key

exchange for reliable communication among the nodes which are vulnerable to various kinds of

attacks such as location disclosure, black hole, replay, work hole, blackmail, denial of service and

routing table poisoning. As the usage of MANETs became ubiquitous, it is essential to have

complete security scheme in place to secure sensitive communications over MANET. As every

node in the MANET is also responsible to cooperate in communications they are targets to

attackers who launchattacks.The technical knowhow about various existing key management

schemes can help in securing MANETs efficiently. In this paper we discussed various key

management schemes found in the literature. This paper also throws light into various routing

protocols and security challenges at various layers of protocol stacks.

International Journal of Computer Engineering and Applications, Volume V, Issue I, Jan 14

REFERENCES

[1] Pratap K. Meher and P. J. Kulkarni.(2011). Analysis and Comparison of Performance of TCP- Vegas in MANET. IEEE .p67-70. [2] Dinesh Singh, Ashish K. Maurya, Anil K. Sarje. (2011). Comparative Performance Analysis of LANMAR, LAR1, DYMO and ZRP Routing Protocols in MANET using Random Waypoint Mobility Model. IEEE .p62-66. [3] Xia Wen-jie, Yan Han and Liu Feng-yu. (2011). The analysis of M/M/1 queue model with N policy for damaged nodes in MANET. IEEE .p289-294. [4] Sudharson Kumar and Parthipan.V. (2011). SOPE: Self-Organized Protocol for Evaluating Trust in MANET using Eigen Trust Algorithm. IEEE. p155-159. [5] FahimMaan, NaumanMazhar. (2011). MANET Routing Protocols vs Mobility Models: A Performance Evaluation. IEEE.p179-184. [6] Giuseppe Cardone, Antonio Corradi, Luca Foschini. (2011). Reliable Communication for Mobile MANET-WSN Scenarios. IEEE.p1085-1091. [7] Jian-Ming Chang, Po-Chun Tsou, Han-Chieh Chao and Jiann-Liang Chen. (2011). CBDS: A Cooperative Bait Detection Scheme to Prevent Malicious Node for MANET Based on Hybrid Defense Architecture. IEEE.p1-5. [8] AlokparnaBandyopadhyay, SatyanarayanaVuppala and PrasenjitChoudhury.(2011). A Simulation Analysis of Flooding Attack in MANET using NS-3. IEEE.p1-5. [9] Mike Burmester and YvoDesmedt.A secure and scalable group key exchange system.Information Processing Letters, May 2005. [10] Q. Zhou, L. Li, S. Wang, S. Xu, and W. Tan, " A Novel Approach toManage Trust in Ad Hoc Networks", IEEE Xplore, ICCIT, 0-7695-3038, 2007. [11] S. S. Rizvi, S. Poudyal, V. Edla, and R. Nepal, " A Novel Approachfor Creating Trust to Reduce Malicious Behavior in MANET", ACM978-1-59593-770-4., 2007. [12] UMANG SINGH. (2011). SECURE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS-A SURVEY AND TAXANOMY. IEEE.p9-17. [13] H Yang H Y. Luo F Ye S W. Lu L Zhang. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE.p1-12. [14] XieHai-tao. (2011). A Cluster-Based Key Management Scheme for MANET. IEEE.p1-4. [15] Shin-Young Cho, Dong-Min Kang, Hun-Jung Lim, Hun-Jung Lim, Jung-Ho Emo and Tai- Myoung Cho. (2011). Mechanism for Regenerating CGA Using Threshold Secret Sharing in MANET. IEEE.p891-895. [16] Deng H, Agrawal DP. TIDS: threshold and identity-based security scheme for wireless ad hoc networks. Ad HocNetworks 2004; 2(3): 291–307. [17] Yuh-Min Tseng. (2005). A heterogeneous-network aided public-key management scheme for mobile ad hoc networks. IEEE.0 (0), p3-15. [18] S. Capkun and J.-P.Hubaux, “BISS: Building Secure Routingout of an Incomplete Set of Security Associations,” Proc. ACMWksp. Wireless Security, ACM Press, 2003, pp. 21–29.