Please use this identifier to cite or link to this item:
http://localhost:8081/xmlui/handle/123456789/311
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gangwar, Rakesh Chandra | - |
dc.date.accessioned | 2014-09-13T11:42:13Z | - |
dc.date.available | 2014-09-13T11:42:13Z | - |
dc.date.issued | 2009 | - |
dc.identifier | Ph.D | en_US |
dc.identifier.uri | http://hdl.handle.net/123456789/311 | - |
dc.guide | Sarje, Anil K. | - |
dc.description.abstract | Nowadays, the popularity of wireless network is increasing very fast. Wireless technology is gaining more and more attention from both academia and industry. Most wireless networks used today, for example, the cell phone networks and the 802.11 Wireless Local Area Networks (WLANs), are based on the wireless network model with pre-existing wired network infrastructures. Packets from source wireless nodes are received by nearby base stations, then injected into the underlying network infrastructure and finally transferred to destination nodes. Another wireless network model, which is actively researched, is the mobile ad hoc network (MANET). This network is formed by only mobile nodes and requires no pre existing network infrastructure. Nodes with wireless capability form a MANET instantly and packets can be delivered to any node in the network. Since there is no base station and no underlying network infrastructure in MANETs, some mobile nodes work as routers to relay packets from source to destination. It is very easy and economic to form an MANET in real time. MANET is ideal in situations like battlefield or emergency rescue area where fixed network infrastructure is very hard to deploy. In recent years the popularity of multicast and group-oriented applications is also rapidly increasing in both scenarios such as wireless as well as wireline networks. Group communication provides point-to-multi-point or multi-point-to-multi-point communication by organizing processes in groups. A set of such processes is called group, where every process is a member of a group. Multicast and group communications are peer to peer and occur in many different settings, such as software updates, multimedia content distribution, interactive gaming and stock data distribution, voice and video conferencing, shared white boards, distributed simulations, as well as online games, replicated servers and databases of all types. The multicast and group communication systems are, therefore, used as vehicle to provide efficient data delivery to a large audience. One of major concerns for such systems is security. Security services include data confidentiality, integrity, authenticity, access control, etc. Many of these services can be facilitated if all group members share a common group key. This makes secure and efficient group key creation, distribution and management a fundamental service and design challenge for Group Communication. The existing group key establishment protocols can be categorized into three categories: centralized, decentralized and contributory. In centralized protocols only one central server is responsible for creation and distribution of keys. In decentralized protocols based on common group key approach, one central server creates and other additional servers help in distributing keys, this way other servers share the load of the central server. In another category of decentralized protocols, the group is divided into subgroups and each subgroup has its own subgroup key. Although this eliminates one-affect-all phenomena, yet it involves a lot of encryption/decryption cost. Since nodes in MANET are not computationally powerful, no one node can work as central server for creating and distributing the keys. Therefore, these protocols are not suitable for secure and efficient group communication in mobile ad hoc networks. In contributory protocols each node contributes equally in group key formation, therefore, these protocols seem to be promising for mobile ad hoc networks. The contributory protocols are also known as group key agreement protocols. This thesis concentrates on group key agreement protocols that are based on the two party Diffie- Hellman protocol. In the thesis we first analyze various existing group key agreement protocols based on the two party key agreement protocol of W. Diffie and M. Hellman, for example, INGM, BD, Hypercube, Octopus, Clique (IKA. 1 and IKA.2), TGDH, NAGKA, and STR. The parameters such as number of rounds, number of messages communicated, number of exponential operations performed and round synchronization are taken into consideration for complexity analysis. All protocols other than Clique protocols need round synchronization, which involves a synchronising device like clock that creates parallel broadcasts, which are problematic in mobile ad hoc networks. From this analysis it is concluded that the Clique protocol suite (IKA. 1 and IKA.2) show the best performance among all the protocols considered. Among clique protocols, IKA.2 protocol needs less number of exponential operations as compared to IKA.l protocol. Although IKA.l protocol is inferior to IKA.2 in terms of exponential operations, yet it is more efficient regarding the number of messages. Group communication involves various dynamic events such as join, merge, leave, and partition, therefore, a group key agreement protocol must make efficient provision for forward and backward secrecy, which means that a joining member(s) should not be able to in decrypt the past communications and leaving member(s) should not be able to decrypt the future communications. So we next analyze group key agreement protocols based on two party Diffie-Hellman protocol for above dynamic membership events. We observe that Clique protocols do not need round synchronization among various group key agreement protocols. And IKA.2 protocol shows the better performance for merge, leave and partition events as far as exponential operations are concerned. It is again concluded that Clique protocols suite shows the best results, especially IKA.2, among various group key agreement protocols. Thus it is observed that a group key agreement protocol must be secure and efficient in various complexity measures. The total number of exponential operations should be small because nodes in MANETs are computationally weak. Further if the number of rounds is independent of group size, the protocol will be highly scalable. Next we propose a protocol suite, which is natural extension of two party Diffie- Hellman protocol. The proposed protocol not only provides efficient algorithms for setup, join (merge) and leave (partition), but also member authentication service. The proposed protocol also has provisions for all valid members to detect errors in communicated messages and stop execution of the protocol immediately as they encounter invalid message from the members who have awry intentions. This helps in eliminating the man-in-the-middle attack in addition to message corruption due to system faults using message verification. In the proposed protocol suite the members are arranged in a logical ring. The setup algorithm takes initial group as an input and outputs a group key after second round. At the end of each round members are authenticated, and after second round messages are also verified for corruption. If message validity checks fail the protocol terminates immediately, otherwise a group key can be generated and saved by each member in addition to three other parameters, which are used during the dynamic events, i.e., join, leave, multiple join and multiple leave. After computing the group key and three parameters other ephemeral data is erased by each member. The proposed protocol suite also consists of an algorithm, which can be used for dynamic events join and merge. The algorithm takes the initial group and joining member(s) as an input and outputs the group key and three other parameters for each member. The algorithm also takes two rounds. After each rounds members are authenticated, and after second round messages are also verified for corruption. If message validity checks fail the protocol terminate immediately, otherwise a group key can be generated and saved by each member in addition to other three parameters, which are used during the future dynamic events. After computing the group key and three parameters other ephemeral data is erased by each member. The proposed protocol suite also consists of an algorithm for leave and partition events. The leave-partition algorithm also takes two rounds. After each round members are authenticated, and after second round messages are also verified for its corruption. If message validity checks fail the protocol terminate immediately, otherwise a group key can be generated. After computing the group key and other parameters, ephemeral data is erased by each member. Security analysis of the proposed protocol has been done in random oracle model. For which a number of oracle queries are used, which can be replaced by actual function for practical purpose, for example, secure signature scheme (S ) and hash function (H) may be replaced by ElGamal digital signature algorithm and secure hash algorithm (SHA-1) respectively. The selected pseudorandom number in ElGamal digital signature algorithm plays an important role in eliminating the impersonation attack when a secret key is somehow compromised. Further, the work shows the comparison between the proposed protocol and Clique protocol suite. The proposed protocol suite does not involve round synchronization as in case of Clique protocols. Thereby, no synchronous mechanism is needed. The number of rounds in setup protocol of IKA. 1 and IKA.2 measures as n and n +1 (where n is the number of group members) whereas our protocol needs only two rounds irrespective of the group size, joinv merge (forjoin or merge) and leave-partition (for leave or partition) protocols also needs two rounds each for their completion, which indicates that the proposed protocol suite is scalable too. The setup protocol in proposed protocol suite needs 3/7 exponential operations whereas n IKA.l and IKA.2 need (—(« + 3)-l) and (5«-6) exponential operations respectively. However, the number of messages n in IKA. 1 protocol is less as compared to IKA.2 and the proposed protocol, which need 2n -1 and 2n messages respectively. It is also seen that the join-merge of our protocol is more efficient in number of exponential operations measure as compared to join (merge) protocol of IKA.l and IKA.2 protocols for large group size. And, the proposed leave-partition protocol is also efficient as compared to IKA. 1 and IKA.2 when the n (the number of current group members) is high and / (the leaving members) is low. Our leave-partition protocol takes 6/ exponential operations as compared to 2(//-/)and (»-/) exponential operations of IKA.l and IKA.2 protocol, where / is number of leaving members. However, in case of number of messages, our leave-partition protocol is inferior to IKA.l and IKA.2 protocols. In the proposed setup protocol, the total cost of computations has been reduced considerably. For authentication, each group member generates two signatures and performs In signature verifications, which creates additional cost for authentication. Other existing protocols, for example, INGM, BD, Hypercube, Octopus, Clique (IKA.l and IKA.2), TGDH, NAGKA, and STR, do not provide authentication, our protocol suite provides member authentication at a nominal cost. In proposed setup protocol, each group member performs at most 3 exponential operations, 4 one-way hash function operations, and n XOR operations. Since the operation dependent on the number of group members is the XOR operation, this way the total cost of computation has been reduced considerably. In view of the above security and complexity analysis of proposed protocol suite and various existing group key agreement protocols, it is logically concluded that the proposed protocol suite outperforms INGM, BD, Hypercube, Octopus, TGDH, NAGKA, STR as well as Clique protocols (IKA. 1 and IKA.2) in terms of number of rounds, number of messages, number of exponential operations and round synchronization. | en_US |
dc.language.iso | en | en_US |
dc.subject | PROTOCOLS FOR MOBILE | en_US |
dc.subject | HOC NETWORKS | en_US |
dc.subject | NETWORK MODEL | en_US |
dc.subject | KEY AGREEMENT PROTOCOL | en_US |
dc.title | ON SECURE GROUP KEY AGREEMENT PROTOCOLS FOR MOBILE AD HOC NETWORKS | en_US |
dc.type | Doctoral Thesis | en_US |
dc.accession.number | G14741 | en_US |
Appears in Collections: | DOCTORAL THESES (E & C) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ON SECURE GROUP KEY AGREMENT PROTOCOLS FOR MOBILE AD HOC NETWORKS.pdf | 6.27 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.