+ All Categories
Home > Documents > Distributed Multicast Group Security Architecture for ...netlab.cs.ucla.edu/wiki/files/Distributed...

Distributed Multicast Group Security Architecture for ...netlab.cs.ucla.edu/wiki/files/Distributed...

Date post: 16-May-2018
Category:
Upload: lamnhan
View: 237 times
Download: 1 times
Share this document with a friend
6
1 of 6 Distributed Multicast Group Security Architecture for Mobile Ad Hoc Networks 1 Jiejun Kong, Yeng-zhong Lee, Mario Gerla Department of Computer Science University of California Los Angeles, CA 90095 {jkong,yenglee, gerla}@cs.ucla.edu 1 Part of this work is funded by ONR MINUTEMAN grant N00014-01-C-0016 and NSF NRT WHYNET grant ANI-0335302. ABSTRACT Multicast communication is an efficient means to support key network applications such as real-time teleconferencing and data dissemination. In this paper we devise a security architec- ture for multicast communications in mobile ad hoc networks (MANETs). Our design is both suitable in MANET environment and compliant to the IETF standard Multicast Group Security Architecture (MGSA) [1]. Because centralized servers are vul- nerable to network dynamics and security attacks in a distrib- uted MANET, we distribute the function of MGSA's Group Con- trol Key Server (GCKS) to a dedicated subset of mobile backbone nodes in MANET. Unlike distributed GCKS nodes in stationary infrastructure networks, our GCKS backbone nodes are mobile, fully distributed and adaptive to network dynamics, in particular the constant and instant changes in network topol- ogy, node density and node mobility. We study the characteris- tics of our GCKS backbone design and its impacts on ad-hoc multicast security research. Our simulation study and Linux implementation confirm the effectiveness of the new MANET MGSA design. I. INTRODUCTION Multicast communication is an efficient means to support key applications of mobile ad hoc networks (MANET) such as tele- conferencing and message dissemination. These applications require both highly secure protections and efficiency guarantees even in the presence of mobility, random link error, and frequent outages. Characteristics of MANET, for example limited re- sources, dynamic topology, vulnerability to network congestion, challenge a secure multicast protocol that is suitable in MANET environment. Many Multicast Group Security Architecture (MGSA) for the management of group control key for multicast communications in distributed networks have been proposed recently, such as in [1][4]. In these proposals, a group control key server (GCKS) node manages cryptographic keys for multicast groups in the network. For an arbitrary multicast group, a group member node must authenticate itself to the GCKS node and establish a pair- wise secure channel protected by the Key Encryption Key (KEK). Then the GCKS node is able to distribute the group key (aka. Net-Key) to the group member node via the pairwise se- cure channel. However, all of these schemes are proposed for a “flat” physical network topology, and result in significant per- formance degradation or even failure in a scalable MANET. Especially in the mobile military networks, there are more and more analytic results and empirical experiments illustrating that a “flat” ad hoc network topology encounters scalability problems due to their intrinsic drawbacks. Recent studies [9][10] present the throughput bounds of homogeneous ad-hoc wireless net- works. Under uniform traffic patterns, the available bandwidth to each networking node approaches zero as the network size increases. As pointed out in [10], one fundamental reason is that communication is not localized, thus long-distance packet flows compete the shared wireless channel with all other intersecting flows. An emerging promising solution for achieving a better perform- ance guarantee in a scalable MANET is to build hierarchical network architecture, such as a cluster structure. Using a clus- tering scheme in a MANET divides nodes into different virtual groups, and those nodes are allocated geographically adjacent into the same cluster according to some rules with different be- haviors for nodes included in a cluster from those excluded from the cluster. By reducing inter-cluster traffic (e.g., converting inter-cluster traffic into intra-cluster traffic), wireless communi- cation is effectively localized and incurs less protocol perform- ance degradation. We present an initial design and implementation framework for MANET MGSA. Our contributions are three-fold. First, we leverage an underlying k-clustering protocol [8] to significantly reduce multicast key management overhead and to accommodate non-uniform node density in the mobile network. Unlike con- ventional single-hop clustering protocols, our scheme applies to any k value as long as k is smaller than the network diameter. Different clusterheads can use different k values according to their estimation of their own capability. Intuitively, given local node density estimation (which can be acquired from a secure neighborhood detection algorithm [11]), a proper value k is se- lected based on the density estimation to perform k-clustering in a neighborhood. A GCKS node is elected as the clusterhead in every cluster. Consequently, the choices of different k’s cope with the idiosyncratic network topology at every site in the mo- bile network, and key management for group members can be performed within the k-cluster with minimized latency. For in- stance, to establish the needed KEK, a joining new group mem- ber should contact the nearest GCKS node which is at most k hops away, rather than to initiate the contact with a remote
Transcript
Page 1: Distributed Multicast Group Security Architecture for ...netlab.cs.ucla.edu/wiki/files/Distributed Multicast Group Security... · Distributed Multicast Group Security Architecture

1 of 6

Distributed Multicast Group Security Architecture for Mobile Ad Hoc Networks1

Jiejun Kong, Yeng-zhong Lee, Mario Gerla

Department of Computer Science University of California Los Angeles, CA 90095

jkong,yenglee, [email protected]

1 Part of this work is funded by ONR MINUTEMAN grant N00014-01-C-0016 and NSF NRT WHYNET grant ANI-0335302.

ABSTRACT Multicast communication is an efficient means to support key network applications such as real-time teleconferencing and data dissemination. In this paper we devise a security architec-ture for multicast communications in mobile ad hoc networks (MANETs). Our design is both suitable in MANET environment and compliant to the IETF standard Multicast Group Security Architecture (MGSA) [1]. Because centralized servers are vul-nerable to network dynamics and security attacks in a distrib-uted MANET, we distribute the function of MGSA's Group Con-trol Key Server (GCKS) to a dedicated subset of mobile backbone nodes in MANET. Unlike distributed GCKS nodes in stationary infrastructure networks, our GCKS backbone nodes are mobile, fully distributed and adaptive to network dynamics, in particular the constant and instant changes in network topol-ogy, node density and node mobility. We study the characteris-tics of our GCKS backbone design and its impacts on ad-hoc multicast security research. Our simulation study and Linux implementation confirm the effectiveness of the new MANET MGSA design.

I. INTRODUCTION Multicast communication is an efficient means to support key applications of mobile ad hoc networks (MANET) such as tele-conferencing and message dissemination. These applications require both highly secure protections and efficiency guarantees even in the presence of mobility, random link error, and frequent outages. Characteristics of MANET, for example limited re-sources, dynamic topology, vulnerability to network congestion, challenge a secure multicast protocol that is suitable in MANET environment.

Many Multicast Group Security Architecture (MGSA) for the management of group control key for multicast communications in distributed networks have been proposed recently, such as in [1][4]. In these proposals, a group control key server (GCKS) node manages cryptographic keys for multicast groups in the network. For an arbitrary multicast group, a group member node must authenticate itself to the GCKS node and establish a pair-wise secure channel protected by the Key Encryption Key (KEK). Then the GCKS node is able to distribute the group key (aka. Net-Key) to the group member node via the pairwise se-cure channel. However, all of these schemes are proposed for a

“flat” physical network topology, and result in significant per-formance degradation or even failure in a scalable MANET. Especially in the mobile military networks, there are more and more analytic results and empirical experiments illustrating that a “flat” ad hoc network topology encounters scalability problems due to their intrinsic drawbacks. Recent studies [9][10] present the throughput bounds of homogeneous ad-hoc wireless net-works. Under uniform traffic patterns, the available bandwidth to each networking node approaches zero as the network size increases. As pointed out in [10], one fundamental reason is that communication is not localized, thus long-distance packet flows compete the shared wireless channel with all other intersecting flows.

An emerging promising solution for achieving a better perform-ance guarantee in a scalable MANET is to build hierarchical network architecture, such as a cluster structure. Using a clus-tering scheme in a MANET divides nodes into different virtual groups, and those nodes are allocated geographically adjacent into the same cluster according to some rules with different be-haviors for nodes included in a cluster from those excluded from the cluster. By reducing inter-cluster traffic (e.g., converting inter-cluster traffic into intra-cluster traffic), wireless communi-cation is effectively localized and incurs less protocol perform-ance degradation.

We present an initial design and implementation framework for MANET MGSA. Our contributions are three-fold. First, we leverage an underlying k-clustering protocol [8] to significantly reduce multicast key management overhead and to accommodate non-uniform node density in the mobile network. Unlike con-ventional single-hop clustering protocols, our scheme applies to any k value as long as k is smaller than the network diameter. Different clusterheads can use different k values according to their estimation of their own capability. Intuitively, given local node density estimation (which can be acquired from a secure neighborhood detection algorithm [11]), a proper value k is se-lected based on the density estimation to perform k-clustering in a neighborhood. A GCKS node is elected as the clusterhead in every cluster. Consequently, the choices of different k’s cope with the idiosyncratic network topology at every site in the mo-bile network, and key management for group members can be performed within the k-cluster with minimized latency. For in-stance, to establish the needed KEK, a joining new group mem-ber should contact the nearest GCKS node which is at most k hops away, rather than to initiate the contact with a remote

Page 2: Distributed Multicast Group Security Architecture for ...netlab.cs.ucla.edu/wiki/files/Distributed Multicast Group Security... · Distributed Multicast Group Security Architecture

2 of 6

GCKS node (as the remote contact will consume network re-source along the long path). The choice of k at each site offers a flexible tradeoff between security performance and network dy-namics. The larger the node density is in a neighborhood, the smaller k is used, and each GCKS node’s workload is approach-ing the average load automatically.

Second, upon the efficient k-clustering algorithm, our MGSA architecture provides secure key management service for multi-cast group members in a MANET. For intra-cluster traffic, each clusterhead performs the function of GCKS node in its k-cluster, so that each group member is served with minimized latency and transmission overhead. For inter-cluster key management, clus-terheads periodically synchronize their states by re-using the underlying multicast routing protocol where the clusterheads are treated as group members of a special multicast group including all current clusterheads. This self-similar design simplifies the protocol specification.

Third, we use analytic stochastic study and empirical simulation study to illustrate the advantage of k-clustering (k>1) over con-ventional single-hop clustering (k=1) in terms of availability and stability. Our results show that k-clustering localizes wireless traffic. In addition, clusters are more stable in mobile ad hoc networks, thus incur less maintenance overhead and ensure bet-ter MGSA service availability.

The paper is organized as follows. In Section II we compare our design with related work. Section III describes our MGSA ar-chitecture and the underlying k-clustering algorithm. We show our implementation and evaluation results in Section IV. And finally Section V concludes this paper.

II. COMPARISON TO RELATED WORK

A. Multicast security Like the IETF standards [1][2][3], our design follows the same MGSA design in multicast security service provisioning. This allows our MANET multicast security design and implementa-tion to be seamlessly connect to existing Internet multicast de-sign and implementations. IETF Multicast Security (MSEC) architecture is comprised of four components. (1) The “data transform” component corresponds to the AH/ESP design in unicast IPsec architecture. The protocols in use are TESLA and MESP (the multicast version of IPsec ESP); (2) The “key man-agement” component applies GDOI and GSAKMP to manage multicast group key in a distributed network; (3) The “policy architecture” component addresses how security policy is speci-fied and how to enforce security policy, for example, via Com-mon Open Policy Service (COPS) protocol; (4) The “algo-rithms” component defines cryptographic algorithms used by the MSEC charter. The current pool includes a set of authentication and key management algorithms like TESLA, LKH (Logical Key Hierarchy), and OFT (One-way Function Tree). In this work, we will focus on realizing an efficient implementation of MGSA-compliant key management component for mobile ad hoc networks. In other words, data transform, security policy, and algorithmic components are not covered in this work. We understand that related research work on TESLA, COPS, LKH,

OFT and many other multicast security issues will build security suites to address these complementary components.

B. Flexible clustering Many clustering schemes have been presented recently for dif-ferent objectives, for example, distributing workload, avoid-ing/balancing unnecessary energy consumption, and providing a cluster infrastructure for upper layer applications. However, unlike the k-clustering algorithm studied in this paper, these ex-isting clustering (or backbone election) algorithms typically only elect backbone nodes within a single-hop neighborhood. As a result, the number of backbone nodes is N/d where N is the total number of nodes and d is the average node density in the net-work. This is a constant fraction without considering the differ-ent network dynamics (e.g., node density) at different sites of the network. More importantly, due to random node mobility, fre-quent re-clustering is required to reflect the constant change in network topology. This incurs significant control overhead even in those simplified single-hop clustering algorithms. For exam-ple, the least cluster change (LCC) [5] is widely used due to their simplicity and stability. LCC is considered to be a significant enhancement of Lowest ID Clustering (LID) and Highest Degree (HD) algorithms. In LID, the LCC clustering algorithm, initially mobile nodes with the lowest ID in their neighborhoods are de-clared themselves as clusterheads. When a node cannot access any cluster head or two cluster heads move into the reach range of each other, it rebuilds the cluster structure for the network according to LID. In HD, the clustering scheme is performed periodically to check the “local highest node degree” attribute of a cluster head. When a cluster head finds a member node with a high degree, it is forced to relinquish its cluster head role, this scheme, of course, involves frequent re-clustering. LCC im-proves cluster stability significantly by relinquishing the re-quirement that a cluster head should always bear some specific attributes in its local area, But however, especially in the pres-ence of node mobility, a node’s movement may invoke the com-plete cluster structure rebuild, and large communication over-head for re-clustering. More recently k-clustering k-connected algorithm [24] focused on constructing robust clusters to cover k nodes and provide k-connectivity guarantee in MANET. While k in our notions denotes hop count, [24] uses k to denote number of nodes and connectivity per cluster. Nevertheless, the empiri-cal results in [24] show that a cluster with more nodes (e.g., with more hop-count coverage) is probabilistically more available than conventional single-hop clustering algorithms, while in below we will show an analytic model to support the conclusion.

III. DISTRIBUTED MULTICAST GROUP SECURITY ARCHITECTURE (DMGSA)

A. Design space and design assumptions In IETF multicast security design [RFC2093, RFC2094, RFC2627, RFC3547, RFC3740], the Group Controller Key Server (GCKS) node shares a pairwise secret with each group member. The pairwise secret is called Key Encryption Key (KEK), which is used to establish multicast group keys (also called Net-Keys). When the group key for a specific multicast group is created / deleted / updated, group control messages are exchanged between GCKS nodes and group members to reflect

Page 3: Distributed Multicast Group Security Architecture for ...netlab.cs.ucla.edu/wiki/files/Distributed Multicast Group Security... · Distributed Multicast Group Security Architecture

3 of 6

the update. The GCKS node encrypts Net-Keys for the multi-cast group to each group member. There are various tree-based optimization schemes, e.g., Logical Key Hierarchy (LKH) [16] and One-way Function Trees (OFT) [15], proposed recently to build virtual tree structures to reduce Net-Key update overheads when group member joins or leaves. Nevertheless, as depicted in Figure 1, the overall architecture is unchanged by these opti-mization designs.

There are some schemes adapting virtual tree-based multicast key management scheme [17] into MANET. These efforts are orthogonal to our design which implements GCKS backbone using physical clustering. On the other hand, other MANET multicast security proposals [13] [14] seek to reduce computa-tional overhead by using more efficient key exchange algorithms (e.g., Key Pre-distribution Scheme used in [14] is purely based on symmetric key cryptography). As we stated earlier, the “al-gorithmic” component is also a complementary issue to our GCKS component design. All these complementary research efforts can be combined with our GCKS component design to facilitate multicast key management in MANETs.

In Figure 1, we assume that the security policies are pre-deployed on all ad hoc nodes prior to their joins of the network. Thus we will not address the “policy architecture” component and policy servers in this paper. In the “key management” com-ponent, dedicated GCKS nodes are responsible of maintaining group control over multicast group members, which dynamically join or leave the multicast groups at their own wills. The com-munication between a GCKS and a specific group member must be authenticated using each other’s credentials (e.g., each node must acquire its certificate from an offline authority) and is pro-tected by KEK. From the group control channel protected by KEK, a group member receives the current group key (i.e., Net-Key), then the multicast group communication amongst senders and receivers is protected by this group-wise Net-Key. The Net-Key is updated when there are group members joining or leaving the group.

Functional Areas

Multicast Security Policies

Group Key Management

Multicast Data Handling

Policy Server

Group Control / Key Server (GCKS)

A sender Receiver(s)

KEK Net-Key

KEK(s)

Policy

Figure 1: Key management component in the IETF standard MGSA architecture

Currently we assume that candidate GCKS nodes are special nodes with relatively large computational resource and high tamper resistance capability. Amongst all N certified network

member nodes, η·N of them are capable of being GCKS nodes. Each GCKS node has enough resource to serve C local nodes. For example, GCKS nodes can be implemented on unmanned aerial vehicles (UAV) and tanks to serve mobile soldiers in their k-hop neighborhoods. Clearly, a centralized GCKS design is vulnerable to security threats even in the wired Internet. For example, the centralized site can be easily disabled by Distrib-uted Denial-of-Service (DDoS) attacks. Research projects like Iolus and IETF informational RFC2627 have shown initial ef-forts in addressing the security challenge. Unfortunately, the proposed countermeasures are dedicated to fixed networks with-out considering network characteristics of MANETs. B. Design details We distribute the “group key management” workload from a centralized GCKS site to a distributed mobile backbone of GCKS nodes. In each k-hop neighborhood, a clusterhead is dy-namically elected whenever the locality is changed in topology by network dynamics (e.g., mobility) or adversarial behaviors (e.g., the head is destroyed). There is no single point of failure in the network, as the adversary is unable to shut down the MGSA service globally or in each locality with candidate GCKS nodes.

We leverage a simple and efficient k-clustering algorithm [8] to elect GCKS nodes (clusterheads). It can be divided into two fully distributed design: cluster formation phase and cluster maintenance phase.

• Fully distributed cluster formation phase: Candidate GCKS nodes that do not belong to any cluster can initiate a cluster formation by broadcasting a clusterhead claim packet up to k hop away to claim itself as a cluster head. The k hop for-warding constraint is enforced with a TTL (Time-to-live) field. A clusterhead claim packet’s TTL field is decreased by one upon each forwarding, until the TTL field becomes 0 and the packet is dropped. The autonomous choice of k is based on the node’s self-estimation of local density (which can be acquired from an existing secure neighborhood de-tection algorithm [11]). The node ensures the property k*d≈C. So that the elected GCKS node will not be over-whelmed by the security workload. Afterward, all its k hop neighbor nodes overhearing such a broadcast claim packet become member of the cluster and give up their right to be a cluster head. If there are multiple broadcasts concurrently occur, the node with least TTL value k and lower ID wins the competition to be the clusterhead.

• Fully distributed cluster maintenance phase: every cluster-head periodically (per thead) broadcasts a clusterhead claim packet within its k-hop scope to maintain its cluster so that the clusterhead claim packet is overheard by all its cluster members. The value of thead is determined by one-hop radio radius r and average node motion speed v, e.g. thead=r/v ap-proximates the average link break time in a mobile ad hoc network. If a cluster member node does not hear a cluster-head claim packet from its clusterhead for a timeout ttimeout =3*thead (where the coefficient 3 can be adapted upon meas-uring local channel error rate traffic and contention ratio),

Page 4: Distributed Multicast Group Security Architecture for ...netlab.cs.ucla.edu/wiki/files/Distributed Multicast Group Security... · Distributed Multicast Group Security Architecture

4 of 6

then the node does not belong to its current cluster any more. It joins other cluster if it hears a clusterhead claim packet from other clusterheads or declares itself as a clus-terhead to form a new cluster after an autonomous random deferring time.

This simple and efficient k-clustering algorithm is employed to dynamically form and maintain clusters in a mobile ad-hoc net-work. In the Hierarchical Multicast Group Security Architecture, each clusterhead functions as a group control key server (GCKS) as illustrated in Figure 2. A multicast group member learns its current group key (also called Net-Key) from the nearest GCKS node which is at most k hops away. In order to deliver a multi-cast group key to each interesting member securely, during the early cluster maintenance period a GCKS node authenticates each member’s credential and establish a pair-wise secret called Key Encryption Key (KEK) with each its member. Via the pair-wise secure channels protected by the KEKs, the GCKS node can securely deliver Net-Key to every multicast group member in its cluster. This only requires a GCKS node to keep track of the keys and multicast group IDs for all member nodes only within its own cluster. In mobile networks, a soft state approach is adopted in our design such that the stored GCKS states expire upon a timeout 10*thead, thus no explicit message overhead is required when mobile nodes leave their current clusters. Like batched re-keying [18], once the GCKS node detects that a threshold number of members have left/joined since last Net-Key update, the current Net-Key of the corresponding multicast group is regenerated, and will be redistributed to other GCKS nodes.

Figure 2: Cluster structure illustration where K = 2

In inter-cluster GCKS synchronization, the underlying multicast routing protocol is reused to disseminate a GCKS node’s newly re-generated states to other GCKS nodes. This self-similar de-sign simplifies protocol specification. Clearly, if the network topology is stable in a k-hop neighborhood, then the correspond-ing GCKS node will not initiate inter-cluster routing packets to incur extra communication overhead.

IV. EVALUATION

A. MANET stochastic modeling Here we use analytic modeling to illustrate the effectiveness of k-clustering over conventional single-hop clustering. We divide the bounded network area into a large amount of small (virtual) grids, so that the grid size is even smaller than the physical size of the smallest network member. This way, each grid is either empty, or is occupied by a single node. Also because the net-work area is much larger than the sum of all mobile nodes’ physical size, the probability that a grid is occupied by a mobile node is very small. Now a binomial distribution B(n, p) defines the probabilistic distribution of how these grids are occupied by each single mobile ad hoc node. Here n, the total number of grids, is very large; and p, the probability that a grid is occupied by the single node, is very small. When n is large and p is small, it is well-known that a binomial distribution B(n, p) approaches Poisson distribution with parameter λ=n·p. Hence this binomial spatial distribution is translated into a spatial Poisson point process [19] to model the random presence of the network nodes. In other words, suppose that N events occur in area A (here an event is an ad hoc node’s physical presence in the area), And the node density ρN=|N| / A (where | | denotes the cardinal-ity of a set, and ρN=|N|·ρ1 if nodes roam independently and iden-tically distributed) is equivalent to a random sampling of A with rate ρN. Let x denote the random variable of number of network nodes in the area. Then the probability that there are exactly m nodes in a specific area A is

Aρm

N Nem!A)(ρm]Pr[x −⋅== (1)

The choice of ρ1 depends on the underlying mobility model. For a network deployed in a bounded system area, let the random variable Ω = (X,Y) denote the Cartesian location of a mobile node in the network area at an arbitrary time instant t. The spa-tial distribution of a node is expressed in terms of the probability density function

20δXY1 δ

)2δyY

2δ(y-)

2δxX

2δ(x-Pr

(x,y) fρ

+≤<∧+≤<

==→

lim

The probability that a given node is located in a subarea A’ of the system area A can be computed by integrating ρ1 over this subarea

dA(x,y)fA']Pr[(X,Y)]A'innodePr[A'

XY∫∫=∈=

where fXY(x,y) can be computed given geometric properties of the network.

Some stochastic mobility models which directly choose a desti-nation direction rather than a destination point and allow a bound back or wrap-around behavior at the border of the system area are able to achieve a uniform spatial distribution [20]. How-ever, the others are not. Let’s use random way point (RWP) model, the most popular one currently used in simulation stud-ies, as the underlying mobility model. The probability of mobile node’s spatial distribution in RWP model has been extensively analyzed in various literatures [21][22][23]. As suggested in [22], we can use the analytical expression

Page 5: Distributed Multicast Group Security Architecture for ...netlab.cs.ucla.edu/wiki/files/Distributed Multicast Group Security... · Distributed Multicast Group Security Architecture

5 of 6

−≈=

4436),(

22

61ayax

ayxfXYρ

for a square network area of size a×a defined by (-a/2≤x≤a/2) and (-a/2≤y≤a/2).

Therefore, the node density ρN is typically a location dependent variable. In particular for the random waypoint model, ρN is higher at the central area and lower at the boundary area [21][22]. In general, for any location dependent distribution, the probability of (1) that there are exactly m nodes in a sub-area A’ of the system area A (with respect to a tiny unit area) is changed to

dAem!ρNm]Pr[x

A'

ρNm

1 1∫∫

⋅⋅== ⋅−

where ρN is the node’s spatial distribution function with respect to the underlying mobility model.

B. Analytic availability and stability study An important metric is how to localize wireless communications in MGSA service provisioning. We use a probabilistic approach to model the GCKS candidate nodes. Amongst all N certified network member nodes, η·N of them are capable of being GCKS nodes. Because GCKS nodes manage cryptographic key materi-als for multicast groups, they must be properly protected in the network.

For any regular node α who needs MGSA service, it should rely on intra-cluster traffic in order to avoid remote communication which features unpredictable service guarantees. Given the value k in k-clustering, the probability that the node α can find a local GCKS node within k hops is

dAe10]Pr[xP2πRk

ρNlocalGCKS ∫∫

⋅⋅−−=>= 1η

Clearly, the difference between PlocalGCKS and 100% decreases exponentially as the network scale N increases linearly. In par-ticular, in the (quasi-)uniform distribution cases, the value k is raised to the exponent ( 1NρRk

localGCKS2

e1P ηπ ⋅−−= ) and thus compen-sates the percentage η. This verifies the conclusion that a few GCKS nodes can be deployed on some highly expensive tamper-proof nodes (e.g., unmanned aerial vehicles--UAV), and k-clustering effectively restores the MGSA service availability to a normal level comparable to a much denser-and-vulnerable solu-tion, for example, when every node can be GCKS node ( 1NρR

localGCKS2

e1P ⋅−−= π ).

Another important metric is the stability of cluster members be-cause this directly determines communication overhead caused by the distributed MGSA design. We define a metric average cluster membership lasting time to measure the stability of clus-ters. The analytic study of cluster stability can be modeled as computing the expected time for a random node staying in a bounded area (e.g., a circular area with radius R). Like what we did before, the area is divided into large amount of points, then all the points are theoretically connected into a fully-connected complete graph. The node goes from one point to another point

in random motion. Clearly, if the radius R increases linearly, the number of the inside points increases quadratically. If the mo-tion pattern uniformly distributed over all the points, then the expected staying time also increases quadratically. Neverthe-less, as the previous analysis showed, the motion pattern is loca-tion dependent and non-uniform in typical mobility models. We use the following simulation study to illustrate the impact of k on cluster stability in random waypoint model.

C. Simulation study In this section, we use Qualnet, a scalable simulation library to evaluate our MGSA design. 1000 mobile nodes are deployed in a 3200m×3200m network field following random waypoint model. Our clustering scheme is adopted to elect GCKS nodes among all nodes. Each mobile node has an IEEE 802.11 wireless radio with transmission range 200m.

In Figure 3, we show the stability of clusters vs. varying speed. When k = 1, k-clustering is used to form only single-hop clus-ters, and when k = 2, the k-clustering is used to form clusters within a 2-hop scope. From Figure 3, we can see that using the k-clusetering algorithm the average membership time that a member remains in a cluster is nearly 40 seconds (k = 1) and 60 seconds(k = 2) in low speed (4m/s). Even in high speed the ratio stays as about 1.7. Clearly, as k increases, the cluster becomes significantly more stable. This justifies the need of k-clustering over existing single-hop clustering schemes.

0

10

20

30

40

50

60

4 6 8 10 12 14 16 18 20Mobility speed (m/sec)

Ave

rage

Mem

bers

hip

Tim

e (s

econ

d)

K= 1 K = 2

Figure 3: Average cluster membership lasting time

D. Testbed experiments Moreover, the MGSA design has been implemented in Linux testbeds under the support of NSF WHYNET project. Our im-plementation of Hierarchical Multicast Group Security Architec-ture is realized as a daemon in user space to minimize changes to the kernel. Our test-bed consists of 14 Dell Pentium IV, 3.0GHz D600 laptops equipped with Orinoco 802.11b PCMCIA card with channel rate as 2Mbps. The laptops run Red-Hat Linux dis-tribution 9 with kernel version 2.4.20. Linux PCMCIA package version 3.2.0 and Orinoco wavelan2-cs driver are used for 802.11b devices and the devices are set to ad-hoc mode. There is one multicast source and three designed receivers among these nodes in our experiments. Using the current test-bed capabilities, we have been able to conduct real network experiments and to test the accuracy and performance of the Hierarchical MGSA

Page 6: Distributed Multicast Group Security Architecture for ...netlab.cs.ucla.edu/wiki/files/Distributed Multicast Group Security... · Distributed Multicast Group Security Architecture

6 of 6

against simulated results. In particular, we have been able to validate the stability of our k-clustering algorithm by showing that, the Hierarchical MGSA testbed exhibits about the same average cluster membership lasting time predicated in the simu-lation study. The lessons learned from the joint testbed and simulation experiments have greatly improved our understand-ing of the architecture and will undoubtedly contribute to more efficient designs in the future.

V. SUMMARY In this paper we have devised a distributed security architecture for multicast communications in mobile ad hoc networks. We distribute the function of MGSA's Group Control Key Server (GCKS) to a dedicated subset of mobile backbone nodes in MANET. We use simple and efficient k-clustering scheme to dynamically elect GCKS backbone nodes at real time. The GCKS backbone nodes are mobile and adaptive to network dy-namics, in particular the constant and instant changes in network topology, node density and node mobility. Our MANET model-ing and analytic study proves that our design localizes MGSA security traffic, thus is suitable in MANET with wireless capac-ity constraints. In addition, we also illustrate the advantage of a flexible k-clustering scheme over conventional single-hop clus-tering schemes: (1) We show that single-hop clustering requires large amount of GCKS nodes, which are vulnerable to intrusion and could cause MGSA service compromise. But k-clustering scheme helps to minimize the number of GCKS nodes. (2) Moreover, we also show that the average cluster membership lasting time is longer as k increases. This helps to reduce cluster maintenance overhead. Our simulation study and Linux testbed confirm the effectiveness of the new MANET MGSA design.

REFERENCES [1] RFC 3740 http://www.faqs.org/rfcs/rfc3740.html [2] RFC 2094 http://www.faqs.org/rfcs/rfc2094.html [3] RFC 4046 http://www.faqs.org/rfcs/rfc4046.html [4] Thomas Hardjono, “Group Security Associations for IP

Multicast Security” in Proceedings of the Internet Security Conference (TIAC) 2001.

[5] C.-C. Chiang et al., "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel," in Proc. IEEE SICON'97, 1997.

[6] C.R Lin, and M. Gerla, “Adaptive Clustering for Mobile Netowrks,” IEEE Journal on Selected Areas in Communica-tions, Vol. 15, No. 7, pp. 1265-1275, Sep 1997.

[7] A. Ephremides, J. E. Wieselthier, and D. J. Baker, "A De-sign Concept for Reliable Mobile Radio Networks with Fre-quency Hopping Signaling," in Proc. IEEE, vol. 75, 1987, pp. 56–73.

[8] Kaixin Xu, Mario Gerla, “A Heterogeneous Routing Proto-col Based on A New Stable Clustering Scheme” In Proceed-ings of Milcom, 2003.

[9] P. Gupta, P.R.Kumar, “The Capacity of Wireless Net-works,”, IEEE Transactions on Information Theory IT, Vol.46, No.2, pp. 388—404, 2002.

[10] J. Li, C. Blake, D.D. Couto, H.I.Lee, R. Morris, “Capacity of Ad Hoc Wireless Networks,” in Proc. of ACM MOBICOM, pp. 61—69, 2001.

[11] Y.-C. Hu, A. Perrig, and D. B. Johnson. “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Proto-cols,” In Proc. of ACM WiSe in conjunction with MOBICOM, pp. 30--40, 2003.

[12] S.Basagni, I.Chlamtac, V.R.Syrotiuk, and B.A.Woodward. “A Distance Routing Effect Algorithm for Mobility (DREAM),” In Proc. of ACM MOBICOM, pp. 76--84, 1998.

[13] T. Kaya, G. Lin, G. Noubir, A. Yilmaz, “Secure multicast groups on ad hoc networks,” In Proc. of the 1st ACM work-shop on Security of ad hoc and sensor, pp. 94 – 102, 2003.

[14] Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia, “GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks,” In Proc. of 1st International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2004), pages 42-51, 2004.

[15] D. Balenson, D. McGrew, and A. Sherman. “Key Manage-ment for Large Dynamic Groups: One-way Function Trees and Amortized Initialization, ” IETF Internet draft (work in progress), August 2000.

[16] C. Wong, M. Gouda, S. Lam. “Secure Group Communica-tion Using Key Graphs,”, In Proc. of SIGCOMM, 1998.

[17] Loukas Lazos, and Radha Poovendran. “Energy-Aware Se-cure Multicast Communication in Ad hoc Networks using Geographic Location Information,” In Proc. of IEEE ICASSP, 2003.

[18] Xiaozhou Steve Li, Yang Richard Yang, Mohamed G. Gouda, and Simon S. Lam, “Batch rekeying for secure group communications,” In Proc. of the tenth international World Wide Web conference on World Wide Web", pp. 525—534 , 2001.

[19] N. Cressie. Statistics for Spatial Data. John Wiley and Sons, 1993.

[20] C. Bettstetter. Mobility Modeling in Wireless Networks: Categorization, Smooth Movement, and Border Effects. ACM Mobile Computing and Communication Review, 5(3):55–67, 2001.

[21] C. Bettstetter, H. Hartenstein, and X. Perez-Costa. Stochas-tic Properties of the Random Waypoint Mobility Model. ACM/Kluwer Wireless Networks, Special Issue on Modeling and Analysis of Mobile Networks, 10(5):555–567, 2004.

[22] C. Bettstetter and C. Wagner. The Spatial Node Distribution of the Random Waypoint Mobility Model. In German Workshop on Mobile Ad Hoc Networks (WMAN), pages 41–58, 2002.

[23] G. Resta and P. Santi. An Analysis of the Node Spatial Dis-tribution of the Random Waypoint Model for Ad Hoc Net-works. In ACM Workshop on Principles of Mobile Comput-ing (POMC), pages 44–50, 2002.

[24] F. Dai and J. Wu. Constructing k-Connected k-Dominating Set in Wireless Networks. In Proceedings of the 19th Inter-national Parallel and Distributed Processing Symposium. April 2005.


Recommended