New Algorithms for the Efficient Design of Topology-Oriented Key Agreement Protocols in Multi-hop Ad Hoc Networks
M. Striki, J. S. Baras, K. Manousakis
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'08), pp. 384-393, Berlin, Germany, March 31 - April 4, 2008.
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research directions in the areas of wireless network security. MANETs are emerging as the desired environment for an increasing number of commercial and military applications, addressing also an increasing number of users. Security on the other hand, is an indispensable requirement of our modern life for all these applications. The inherent limitations of such dynamic and resource-constraint networks impose major difficulties in establishing a suitable secure group communications framework. This is even more so for the task of Key Agreement (KA), under which all parties contribute equally to the group key. The logical design of efficient KA protocols has been the main focus of the related research to-date. Such a consideration however, gives only a partial account on the feasibility and actual performance of a KA protocol in a real multi-hop network. This is because protocols have been evaluated only in terms of the group key related messaging in isolation from the underlying network functions that interact with the logical scheme and support its correct execution (i.e. routing). In this work, we contribute towards efficiently extending a number of Diffie-Hellman (DH)-based group KA protocols in wireless multi-hop ad hoc networks, and measuring their actual performance over these networks. Towards this end, we introduce a number of new algorithms that intelligently blend the logical protocol design with the underlying routing and network topology, to produce schemes that substantially improve on the metrics of interest. Indeed, the resulting protocols accomplish this goal, as our analytical and simulation results indicate.