Visible to the public A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks

TitleA Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks
Publication TypeConference Paper
Year of Publication2022
AuthorsHan, Wendie, Zhang, Rui, Zhang, Lei, Wang, Lulu
Conference Name2022 IEEE Wireless Communications and Networking Conference (WCNC)
Date Publishedapr
KeywordsAccess Control, Ad Hoc Network Security, Ad hoc networks, authentication, composability, Human Behavior, Key Management, Metrics, mobile ad-hoc networks, Optimized production technology, performance evaluation, Protocols, pubcrawl, Receivers, resilience, Resiliency, Scalability, secure group communication, security, Wireless communication
Abstract

Mobile Ad-hoc Networks (MANETs) have attracted lots of concerns with its widespread use. In MANETs, wireless nodes usually self-organize into groups to complete collaborative tasks and communicate with one another via public channels which are vulnerable to attacks. Group key management is generally employed to guarantee secure group communication in MANETs. However, most existing group key management schemes for MANETs still suffer from some issues, e.g., receiver restriction, relying on a trusted dealer and heavy certificates overheads. To address these issues, we propose a group key management scheme for MANETs based on an identity-based authenticated dynamic contributory broadcast encryption (IBADConBE) protocol which builds on an earlier work. Our scheme abandons the certificate management and does not need a trusted dealer to distribute a secret key to each node. A set of wireless nodes are allowed to negotiate the secret keys in one round while forming a group. Besides, our scheme is receiver-unrestricted which means any sender can flexibly opt for any favorable nodes of a group as the receivers. Further, our scheme satisfies the authentication, confidentiality of messages, known-security, forward security and backward security concurrently. Performance evaluation shows our scheme is efficient.

DOI10.1109/WCNC51071.2022.9771870
Citation Keyhan_secure_2022