DOI QR코드

DOI QR Code

A Location Dependent Group Key Management Scheme for High Confidential Information in Tactical Wireless Networks

전술 무선 네트워크에서 고비밀성 정보 공유를 위한 위치 종속적 그룹키 관리 기법

  • Lee, Jong-Kwan (Cyber Warfare Research Center, Korea Military Academy) ;
  • Shin, Kyuyong (Cyber Warfare Research Center, Korea Military Academy) ;
  • Kim, Kyung-Min (Cyber Warfare Research Center, Korea Military Academy)
  • 이종관 (육군사관학교 사이버전 연구센터) ;
  • 신규용 (육군사관학교 사이버전 연구센터) ;
  • 김경민 (육군사관학교 사이버전 연구센터)
  • Received : 2018.04.19
  • Accepted : 2018.08.10
  • Published : 2018.10.05

Abstract

In this paper, we propose a group key management scheme for very high confidential information in tactical wireless networks. For the proposed scheme, we consider the tactical networks that has a hierarchical topology and the nature of high confidential information. The leader node, which may have higher probability of good channel state than others, provides some data to all the network member in order to generate a geographical group key and it transmits the encrypted information with minimum transmission power level to others. By this scheme, the security and reliability for sharing confidential information is ensured. The performance of the proposed scheme is validated by mathematical analysis. It shows that the proposed scheme makes nodes to share a high confidential information securely if the proper parameters for network design are selected.

Keywords

References

  1. Sandro Rafaeli and David Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, Vol. 35, No. 3, pp. 309-329, Sep. 2003. https://doi.org/10.1145/937503.937506
  2. Eric Ke Wand, Yuming Ye, and Xiaofei Xu, "Location-Based Distributed Group Key Agreement Scheme for Vehicular Ad Hoc Netwok," Internation Journal of Distributed Sensor Networks, 2014.
  3. Junbeom Hur and Hyunsoo Yoon, “A Decentralized Multi-Group Key Management Scheme,” IEICE Trans. Communications, Vol. E92-B, No. 2, pp. 632-635, Feb. 2009. https://doi.org/10.1587/transcom.E92.B.632
  4. Chang-Oh Kim, Kyungran Kang and Young-Jong Cho, “A Distributed Multicast Group Key Management Scheme for a Hierarchically Structured Network,” Journal of KIISE, Vol. 38, No. 1, pp. 22-32, Feb. 2011.
  5. Farooq Anjum, "Location Dependent Key Management in Sensor Networks without Using Deployment Knowledge," Wireless Network, pp. 1587-1600, Oct. 2008.
  6. C. K. Wong, M. Gouda, S. S. Lam, "Secure Group Communications Using Key Graphs," IEEE/ACM Trans. Networking, Vol. 8, pp. 16-31, Feb. 2000. https://doi.org/10.1109/90.836475
  7. Y. Amir, Y. Kim, C. Nita-Rotaru, J. L. Schultz, J. Stanton, and G. Tsudik, “Secure Group Communication Using Robust Contributory Key Agreement,” IEEE Transactions on Parallel and Distributed Systems, Vol. 15, No. 5, pp. 468-480, 2004. https://doi.org/10.1109/TPDS.2004.1278104
  8. Mark Manulis, "Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups," Mobile Adhoc and Sensor Systems Conference, Dec. 2005.
  9. Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, Michael Galloway, "A Survey of Key Management Schemes in Wireless Sensor Networks," Computer Communications, Vol. 30 pp. 2314-2341, 2007. https://doi.org/10.1016/j.comcom.2007.04.009
  10. R. D. Pietro, L. Mancinim, Y. Law, S. Etalle, and P, Havinga, "LKHW : A Directed Diffusion-based Secure Multicast Scheme for Wireless Sensor Networks," International Conference on Parallel Processing Workshops, pp. 397-406, Oct. 2003.
  11. T. Aurisch, "Using Key Trees for Securing Military Multicast Communication," IEEE Milcom 04, 2004.
  12. T. Aurisch, "Optimization Techniques for Military Multicast Key Management," IEEE Milcom 05, 2005.