Browse > Article
http://dx.doi.org/10.9766/KIMST.2018.21.5.658

A Location Dependent Group Key Management Scheme for High Confidential Information in Tactical Wireless Networks  

Lee, Jong-Kwan (Cyber Warfare Research Center, Korea Military Academy)
Shin, Kyuyong (Cyber Warfare Research Center, Korea Military Academy)
Kim, Kyung-Min (Cyber Warfare Research Center, Korea Military Academy)
Publication Information
Journal of the Korea Institute of Military Science and Technology / v.21, no.5, 2018 , pp. 658-664 More about this Journal
Abstract
In this paper, we propose a group key management scheme for very high confidential information in tactical wireless networks. For the proposed scheme, we consider the tactical networks that has a hierarchical topology and the nature of high confidential information. The leader node, which may have higher probability of good channel state than others, provides some data to all the network member in order to generate a geographical group key and it transmits the encrypted information with minimum transmission power level to others. By this scheme, the security and reliability for sharing confidential information is ensured. The performance of the proposed scheme is validated by mathematical analysis. It shows that the proposed scheme makes nodes to share a high confidential information securely if the proper parameters for network design are selected.
Keywords
Group Key; Tactical Wireless Network; Transmission Power; Location Dependent; High Confidential Information;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sandro Rafaeli and David Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, Vol. 35, No. 3, pp. 309-329, Sep. 2003.   DOI
2 Eric Ke Wand, Yuming Ye, and Xiaofei Xu, "Location-Based Distributed Group Key Agreement Scheme for Vehicular Ad Hoc Netwok," Internation Journal of Distributed Sensor Networks, 2014.
3 Junbeom Hur and Hyunsoo Yoon, “A Decentralized Multi-Group Key Management Scheme,” IEICE Trans. Communications, Vol. E92-B, No. 2, pp. 632-635, Feb. 2009.   DOI
4 Chang-Oh Kim, Kyungran Kang and Young-Jong Cho, “A Distributed Multicast Group Key Management Scheme for a Hierarchically Structured Network,” Journal of KIISE, Vol. 38, No. 1, pp. 22-32, Feb. 2011.
5 Farooq Anjum, "Location Dependent Key Management in Sensor Networks without Using Deployment Knowledge," Wireless Network, pp. 1587-1600, Oct. 2008.
6 C. K. Wong, M. Gouda, S. S. Lam, "Secure Group Communications Using Key Graphs," IEEE/ACM Trans. Networking, Vol. 8, pp. 16-31, Feb. 2000.   DOI
7 Y. Amir, Y. Kim, C. Nita-Rotaru, J. L. Schultz, J. Stanton, and G. Tsudik, “Secure Group Communication Using Robust Contributory Key Agreement,” IEEE Transactions on Parallel and Distributed Systems, Vol. 15, No. 5, pp. 468-480, 2004.   DOI
8 Mark Manulis, "Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups," Mobile Adhoc and Sensor Systems Conference, Dec. 2005.
9 Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, Michael Galloway, "A Survey of Key Management Schemes in Wireless Sensor Networks," Computer Communications, Vol. 30 pp. 2314-2341, 2007.   DOI
10 R. D. Pietro, L. Mancinim, Y. Law, S. Etalle, and P, Havinga, "LKHW : A Directed Diffusion-based Secure Multicast Scheme for Wireless Sensor Networks," International Conference on Parallel Processing Workshops, pp. 397-406, Oct. 2003.
11 T. Aurisch, "Using Key Trees for Securing Military Multicast Communication," IEEE Milcom 04, 2004.
12 T. Aurisch, "Optimization Techniques for Military Multicast Key Management," IEEE Milcom 05, 2005.