Abstract
Since its introduction as a communications medium, wireless technology has found broad application on the battlefield. Accompanying dramatic advances in wireless technology and the capabilities associated with small computing devices, the demand for advanced mechanisms to employ wireless technology in the battlefield continues to grow. We propose a model for deriving and reasoning about security protocols designed for battlefield use in ad hoc wireless networks. We contend that our model facilitates reasoning about protocols by integrating the communications and cryptographic aspects of battlefield group communication, and allows automated reasoning about resulting protocols. We illustrate our concept by introducing protocols to support special communication cases associated with the battlefield.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ateniese, G., Steiner, M., Tsudik, G.: Authenticated Group Key Agreement and Friends. In: ACM CCS ACM (November 1998)
Burrows, M., Abadi, M., Needham, R.M.: A Practical Study in Belief and Action. In: Vardi, M. (ed.) Proc of the 2nd Conf on Theoretical Aspects of Reasoning about Knowledge, Asilomar, Ca., February 1988, pp. 325–342. Morgan Kaufmann, Los Altos (1988)
Cheriton, D.R., Deering, S.E.: Host Groups: A Multicast Extension for Datagram Internetworks. In: 9th Data Communication Symposium (September 1985)
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proc. IEEE Infocom (March 1999)
Diffie, W., Hellman, M.: New Directions In Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
Diffie, W., van Oorshot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchanges. Codes and Cryptography 2(2), 107–125 (1992)
Fischer, M., Wright, R.N.: An Efficient Protocol for Unconditionally Secure Secret Key Exchange. In: Proc of the 4th Symp on Discrete Algorithms, pp. 475–483 (1993)
Hardjono, T., Cain, B., Dorawswamy, N.: A framework for group key management for multicast security, IETF Internet draft (August 2000), draft-ietf-ipsecgkmframework-03.txt
Harn, L., Kiesler, T.: Authenticated Group Key Distribution Scheme For a Large Distributed Network. In: IEEE Symposium on Security and Privacy, pp. 300–309 (1989)
Meadows, C.: A System for the Specification and Analysis of Key Management Protocols. In: IEEE Computer Society Symp on Research in Security and Privacy, pp. 182–195 (1991)
Meadows, C., Narendran, P.: A Unification Algorithm for the Group Diffie- Hellman Protocol. In: WITS (in conjunction with POPL 2002), Portland, Oregon, USA (January 14-15, 2002)
Moyer, M.J., Rao, J.R., Rohatgi, P.: A survey of security issues in multicast communications. In: IEEE Network, November/December 1999, pp. 12–23 (1999)
Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. CACM 21(12), 993–999 (1978)
Ramalho, M.: Intra and inter-domain multicast routing protocols: A survey and a taxonomy. IEEE Communications Surveys & Tutorials 3(1), 2–25 (2000)
Reiter, M.: A secure group membership protocol. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA (May 1994)
Shields, C., Garcia-Luna-Aceves, J.J.: KHIP—A scalable protocol for secure multicast routing. In: ACM SIGCOMM (1999)
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: Proc. 3rd ACM CCS, New Dehli, India, May 14-16, pp. 31–37 (1996)
Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8(1), 16–30 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yasinsac, A., Davis, J.A. (2004). Modeling Protocols for Secure Group Communications in Ad Hoc Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-39871-4_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20830-3
Online ISBN: 978-3-540-39871-4
eBook Packages: Springer Book Archive