Skip to main content

Modeling Protocols for Secure Group Communications in Ad Hoc Networks

  • Conference paper
Book cover Security Protocols (Security Protocols 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2845))

Included in the following conference series:

Abstract

Since its introduction as a communications medium, wireless technology has found broad application on the battlefield. Accompanying dramatic advances in wireless technology and the capabilities associated with small computing devices, the demand for advanced mechanisms to employ wireless technology in the battlefield continues to grow. We propose a model for deriving and reasoning about security protocols designed for battlefield use in ad hoc wireless networks. We contend that our model facilitates reasoning about protocols by integrating the communications and cryptographic aspects of battlefield group communication, and allows automated reasoning about resulting protocols. We illustrate our concept by introducing protocols to support special communication cases associated with the battlefield.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. In: ACM CCS ACM (November 1998)

    Google Scholar 

  2. Burrows, M., Abadi, M., Needham, R.M.: A Practical Study in Belief and Action. In: Vardi, M. (ed.) Proc of the 2nd Conf on Theoretical Aspects of Reasoning about Knowledge, Asilomar, Ca., February 1988, pp. 325–342. Morgan Kaufmann, Los Altos (1988)

    Google Scholar 

  3. Cheriton, D.R., Deering, S.E.: Host Groups: A Multicast Extension for Datagram Internetworks. In: 9th Data Communication Symposium (September 1985)

    Google Scholar 

  4. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proc. IEEE Infocom (March 1999)

    Google Scholar 

  5. Diffie, W., Hellman, M.: New Directions In Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  6. Diffie, W., van Oorshot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchanges. Codes and Cryptography 2(2), 107–125 (1992)

    Article  MathSciNet  Google Scholar 

  7. Fischer, M., Wright, R.N.: An Efficient Protocol for Unconditionally Secure Secret Key Exchange. In: Proc of the 4th Symp on Discrete Algorithms, pp. 475–483 (1993)

    Google Scholar 

  8. Hardjono, T., Cain, B., Dorawswamy, N.: A framework for group key management for multicast security, IETF Internet draft (August 2000), draft-ietf-ipsecgkmframework-03.txt

  9. Harn, L., Kiesler, T.: Authenticated Group Key Distribution Scheme For a Large Distributed Network. In: IEEE Symposium on Security and Privacy, pp. 300–309 (1989)

    Google Scholar 

  10. Meadows, C.: A System for the Specification and Analysis of Key Management Protocols. In: IEEE Computer Society Symp on Research in Security and Privacy, pp. 182–195 (1991)

    Google Scholar 

  11. Meadows, C., Narendran, P.: A Unification Algorithm for the Group Diffie- Hellman Protocol. In: WITS (in conjunction with POPL 2002), Portland, Oregon, USA (January 14-15, 2002)

    Google Scholar 

  12. Moyer, M.J., Rao, J.R., Rohatgi, P.: A survey of security issues in multicast communications. In: IEEE Network, November/December 1999, pp. 12–23 (1999)

    Google Scholar 

  13. Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. CACM 21(12), 993–999 (1978)

    MATH  Google Scholar 

  14. Ramalho, M.: Intra and inter-domain multicast routing protocols: A survey and a taxonomy. IEEE Communications Surveys & Tutorials 3(1), 2–25 (2000)

    Article  Google Scholar 

  15. Reiter, M.: A secure group membership protocol. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA (May 1994)

    Google Scholar 

  16. Shields, C., Garcia-Luna-Aceves, J.J.: KHIP—A scalable protocol for secure multicast routing. In: ACM SIGCOMM (1999)

    Google Scholar 

  17. Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: Proc. 3rd ACM CCS, New Dehli, India, May 14-16, pp. 31–37 (1996)

    Google Scholar 

  18. Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yasinsac, A., Davis, J.A. (2004). Modeling Protocols for Secure Group Communications in Ad Hoc Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39871-4_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20830-3

  • Online ISBN: 978-3-540-39871-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics