认知无线电MANET中基于三叉树的组密钥协商协议(IJCNIS-V6-N10-3)
- 格式:pdf
- 大小:590.67 KB
- 文档页数:8
基于n叉树的动态安全群密钥协商协议高玮;胡予濮;杨红梅【期刊名称】《计算机应用研究》【年(卷),期】2009(026)006【摘要】将三叉树拓展为n叉树引入到群密钥中,提出了动态安全的基于n叉树的可认证群密钥协商协议.在三叉树的基础上进一步减少了轮数,计算复杂度由O(log3 m)降低为O(logn m),但是单轮内成员间通信量增加.群内成员先进行树结构的划分,每n个节点作为相应上一级节点的孩子节点,n个节点分别选定代表,n个代表通过调用协议BCP协商密钥得到本轮即相应父亲节点的子密钥,重复进行上述过程最终可以得到群组密钥.同时,协议考虑了有成员加入或离开的动态情形并给出了很好的解决方案,一方面保证了动态情形发生时,在前一时刻计算出结果的基础上作最小的修改就能得到新的密钥,从而减少了计算量;另一方面动态方案保持了树的结构始终均衡.其意义在于,如果成员加入或离开后树的结构不能保持,下一步加入或离开就不能顺利进行,需重新进行树结构的划分.最后基于随机预言机模型的安全性分析证明了协议是安全的.【总页数】4页(P2180-2183)【作者】高玮;胡予濮;杨红梅【作者单位】西安电子科技大学,计算机网络与信息安全教育部重点实验室,西安,710071;西安电子科技大学,计算机网络与信息安全教育部重点实验室,西安,710071;西安电子科技大学,计算机网络与信息安全教育部重点实验室,西安,710071【正文语种】中文【中图分类】TP309【相关文献】1.基于m叉树与DH协议的组密钥协商协议 [J], 张志军;郭渊博;刘伟;吕金娜2.三叉树结构下的群认证密钥协商协议 [J], 张龙翔3.基于二叉树的非签名认证密钥协商协议 [J], 吴福生;张焕国4.一个动态的安全有效的群密钥协商协议 [J], 郑世慧;王少辉;张国艳5.动态对等群上的基于身份的认证密钥协商协议 [J], 汪小芬;谭示崇;董庆宽;肖国镇因版权原因,仅展示原文概要,查看原文内容请购买。
MANET协议解析自组织无线网络的协议自组织无线网络(MANET)是指一种动态形成的、无中心化的无线通信网络。
它由一组移动节点组成,这些节点可以自由地移动和加入或离开网络。
为了实现节点之间的通信,MANET依赖于特定的协议。
在本文中,我们将探讨MANET协议的功能和工作原理。
一、引言自组织无线网络的出现与日俱增的移动设备和对无线通信的需求密切相关。
与传统的基础设施模式不同,MANET网络没有固定的中心节点,而是通过节点之间的协作来建立网络连接。
这种特性使得MANET 网络具有更大的灵活性和鲁棒性。
二、MANET协议的分类MANET协议可以分为三类:路由协议、媒体访问控制(MAC)协议和网络管理协议。
1. 路由协议路由协议是MANET中最重要的一类协议。
它们负责确定数据在网络中的传输路径。
常见的路由协议包括以下几种:- Ad Hoc On-Demand Distance Vector(AODV)协议:AODV协议根据节点之间的距离选择最短的路径。
当一个节点需要与另一个节点通信时,它会发送路由请求,并通过网络中其他节点传播该请求,直到找到最佳路径。
- Dynamic Source Routing(DSR)协议:DSR协议通过维护一张路由缓存表来实现路由。
当数据包需要传输时,源节点会在数据包中附加所有的中间节点并将其发送到目标节点。
- Optimized Link State Routing(OLSR)协议:OLSR协议主要用于大规模的MANET网络。
它通过多点中继节点来减少网络中的控制信息。
2. MAC协议MAC协议负责调度和管理无线网络中的数据传输。
常见的MAC协议包括:- IEEE 802.11:这是一种广泛应用的无线局域网协议,它定义了数据的传输方式和数据帧的格式。
- MACA(多信道访问)协议:MACA协议通过多重复用信道来提高网络的容量。
它采用了请求-应答机制来避免冲突和协调数据的传输。
3. 网络管理协议网络管理协议用于管理和监控MANET网络。
基于Weil配对的口令认证组密钥交换协议
李国敬;苏晓曦;温涛
【期刊名称】《沈阳工业大学学报》
【年(卷),期】2011(033)003
【摘要】针对以往组密钥交换协议中存在的计算效率和安全性方面的问题,提出一种基于Weil配对的口令认证组密钥交换协议.将三叉逻辑密钥树结构与Weil配对相结合,使用简单的点乘运算和双线性配对运算来替代复杂的求幂运算,经过3轮通信来完成组密钥的建立和认证过程,实现安全的密钥交换.实验结果表明,该算法降低了逻辑密钥树的高度和复杂性,进一步提高了计算效率.在安全性方面,能够抵抗在线和离线字典攻击等一系列干扰,具有向前安全性.
【总页数】5页(P299-302,314)
【作者】李国敬;苏晓曦;温涛
【作者单位】东北大学信息科学与工程学院,沈阳110004;中央烟台市委党校行政管理教研室,山东烟台264000;东北大学信息科学与工程学院,沈阳110004;东北大学信息科学与工程学院,沈阳110004
【正文语种】中文
【中图分类】TP309.7
【相关文献】
1.基于双线性配对的密钥树口令认证组密钥交换协议 [J], 柳秀梅;高克宁;常桂然
2.利用Weil配对的基于身份的三方密钥交换协议 [J], 杨振起
3.基于RLWE问题的后量子口令认证密钥交换协议 [J], 李子臣;谢婷;张卷美
4.基于理想格的通用可组合两方口令认证密钥交换协议 [J], 舒琴;王圣宝;路凡义;韩立东;谭肖
5.理想格上基于验证元的三方口令认证密钥交换协议 [J], 舒琴;王圣宝;胡斌;韩立东
因版权原因,仅展示原文概要,查看原文内容请购买。
————————————作者简介作者简介::周 林(1987-),男,硕士研究生,主研方向:网络安全,密码学;矫文成,副教授;吴 杨,硕士研究生 收稿日期收稿日期::2011-11-18 修回日期修回日期::2012-02-06 E-mail :703124485@基于身份认证的卫星网络组密钥管理方案周 林,矫文成矫文成,,吴 杨(军械工程学院计算机工程系,石家庄 050003)摘 要:为解决卫星网络组播通信过程中成员动态变化及认证等问题,提出一个基于身份认证的三叉密钥树组密钥管理方案。
根据卫星网络多层次结构的特点,设计组密钥协商模型,将高轨道卫星作为组密钥协商发起节点,地面控制端作为系统的可信第三方。
在密钥协商过程中,利用双线性对和身份认证技术鉴别不诚实的节点,并引入签名机制,保证盲密钥树的认证性及完整性。
分析结果表明,该方案具有较强的安全性,并且计算量小,通信效率高。
关键词关键词::卫星网络;组密钥管理;组密钥协商;身份认证;三叉密钥树Group Key Management Scheme in Satellite NetworkBased on ID AuthenticationZHOU Lin, JIAO Wen-cheng, WU Yang(Department of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003, China)【Abstract 】To overcome the problems of mobility and authentication in multicast communication of satellite network, this paper presents a group key management with ternary key tree based on ID authenticated. A key negotiation matrix is designed due to the multiplayer of satellite network, which regards the satellites of high orbit as group key negotiation sponsored nodes and set telluric control center as the third trusted party. Bilinear parings and ID authentication technique are employed in the key negotiation process, therefore the dishonest nodes can be detected and identified. A signature is proposed to ensure the authentication and integrality of the blind key tree. Performance analysis shows that the proposed scheme has strong security, less computation and communication cost.【Key words 】satellite network; group key management; group key negotiation; ID authentication; ternary key tree DOI: 10.3969/j.issn.1000-3428.2012.19.022计 算 机 工 程 Computer Engineering 第38卷 第19期V ol.38 No.19 2012年10月October 2012·安全技术安全技术·· 文章编号文章编号::1000—3428(2012)19—0085—04 文献标识码文献标识码::A中图分类号中图分类号::TP309.21 概述20世纪60年代以来,卫星通信迅速发展,在军事、商业等领域得到了广泛的应用。
基于单向密钥链树的组播密钥更新协议
祝烈煌;曹元大
【期刊名称】《北京理工大学学报》
【年(卷),期】2004(24)7
【摘要】分析基于层次K叉树(HKT)的组播密钥更新协议,提出了组员加入和离开通信组时,基于单向密钥链树(OKCT)的组播密钥更新协议,分析了该协议的性能.结果表明,在不增加组控制者和组员密钥存储空间的基础上,该协议将组员加入和离开通信组的密钥更新消息包数分别减少到logkn和(k-1)logkn-1,并且降低了组控制者加密和组员解密密钥更新消息的计算量.
【总页数】4页(P609-612)
【关键词】组播;密钥更新;单向密钥链
【作者】祝烈煌;曹元大
【作者单位】北京理工大学信息科学技术学院计算机科学工程系;北京理工大学软件学院
【正文语种】中文
【中图分类】TP309
【相关文献】
1.基于LKH混合树模型的新型组播密钥更新方案 [J], 管春雷;王斌;殷玲玲;沈洁
2.基于LKH混合树的组播密钥更新方案 [J], 杨焱林
3.基于LT编码的可靠组播密钥更新协议 [J], 周靖哲;赵安军
4.基于LKH树和二值函数的组播密钥更新方案 [J], 黄冬久;唐宝民
5.基于Huffman单向函数树的组播密钥更新协议 [J], 祝烈煌;曹元大
因版权原因,仅展示原文概要,查看原文内容请购买。
I.J. Computer Network and Information Security, 2014, 10, 24-31Published Online September 2014 in MECS (/)DOI: 10.5815/ijcnis.2014.10.03Ternary Tree Based Group Key Agreement for Cognitive Radio MANETsN. RenugadeviDepartment of CSE, National Institute of Technology, Tiruchirapalli, Tamilnadu - 620015, India406112002@C. MalaDepartment of CSE, National Institute of Technology, Tiruchirapalli, Tamilnadu - 620015, Indiamala@Abstract—This paper presents an efficient contributory group key agreement protocol for secure communication between the lightweight small devices in cognitive radio mobile ad hoc networks. A Ternary tree based Group ECDH.2 (TGECDH.2)protocol that uses a batch rekeying algorithm during membership change is proposed in this paper. This ternary tree is a balanced key tree in which appropriate insertion point is selected for the joining members during rekeying operation. TGECDH.2 combines the computational efficiency of ECDH protocol and the communication efficiency of GDH.2 protocol. From the performance analysis, it is inferred that the TGECDH.2 outperforms an existing ternary tree based protocol. Hence, it is best suited for the resource constrained mobile devices such as notebooks, laptops, sensors, etc. in cognitive radio mobile ad hoc networks.Index Terms—Batch rekeying, Cognitive radio MANETs, Key agreement, ECDH, Ternary tree.I.I NTRODUCTIONThe collaborative group oriented applications such as pay per TV, video conferencing, online games, etc., use a shared group key for providing secure communication. This section discusses about an efficient Group Key Agreement (GKA) protocol for Cognitive Radio Mobile Adhoc NETworks (CRMANETs).Rapid developments in wireless technology led to the problem of shortage in unlicensed spectrum bands while licensed frequency bands are not fully utilized. The Cognitive Radio (CR) proposed in [1] can solve the problem of this spectrum scarcity by accessing the unused portions of licensed frequency bands when it is not in use. CR devices are aware of their working environment and they can dynamically change their internal parameters such as protocol used, modulation type when it detects the variations in the radio spectrums. The main challenges in CR devices are learning from the environment, intelligence and adaptability to provide the reliable and efficient communication.In CR Network (CRN), the spectral efficiency can be improved by allowing the unlicensed users to access the spectrum allocated to the licensed users. In CRN, the CR users or Secondary Users (SUs) can employ the technique called Secondary Spectrum Access (SSA) to share the spectrums assigned to the licensed users or Primary Users (PUs). The CR devices can employ three types of transmission or spectrum access techniques such as overlay, underlay and ing the ‗Underlay‘ technique of SSA, SU can coexist with PU and can use the licensed bands for their own communication [2].In addition to the normal operations of wireless nodes, the devices in the CRN carry out some additional dynamic functions such as spectrum sensing, spectrum sharing, spectrum access, etc. The CR users perform group communication during these dynamic operations to exchange their local data in order to obtain the final result of the operations. To provide group security in CRN, the authors of [3] suggested the use of a shared group key to perform secure communication.A Mobile Ad hoc Network (MANET) is a collection of mobile devices or nodes that can communicate with each other without any pre-determined infrastructure and links. There is no clear boundary in this network when compared to conventional wired networks. The mobile nodes are free to join and leave the network at any point of time. Hence, MANETs are more vulnerable to security attacks than wired networks due to its dynamic topology. The cryptographic techniques are used to protect this network from unauthorized users. The group key management plays an important role in securing the communication between nodes in MANETs. Several group key management techniques were used in the literature to provide secure communication. These key management schemes can be classified as a) Key distribution method and b) Contributory GKA (CGKA) method based on the method used to establish the group key.In the key distribution methods [4-9], a single entity called the Key Distribution Center (KDC) generates and distributes individual keys and initial group key to the members in a group. It is also responsible to re-compute the new group key during the membership change. But, there is no KDC in the CGKA schemes [10-24]. CGKA requires each group member to contribute an equal shareto compute the common group key. The resource restricted CRMANETs can employ CGKA scheme to generate the group key rather than distributed schemes as there is no Trusted Third Party or Certification Authority. DH protocol [10] performs expensive modular exponentiations which require high CPU and memory capabilities. ECDH protocol [11] performs computationally efficient operations with smaller keys when compared to DH. GDH.2 [13] has less communication overhead than GDH.1 and GDH.3 [13]. It is seen in the literature that the tree based CGKA methods reduce the overall complexity to O (log n), where ‗n‘ is the group size [17]. The rekeying, a process of updating the group key is classified into two categories based on the rekeying time. The Individual-based Rekeying (IR) [17-21] updates the group key after each join or leave request. The Interval based Batch Rekeying (BR) [22-24] collects join and leave requests and updates the group key after a fixed time interval so that it reduces the overall complexity [24]. Therefore, this paper proposes the use of ternary key tree and BR approach for the devices in CRMANETs.The rest of this paper is organized as follows. Section 2 presents several representative schemes of CGKA protocols. The BR algorithms used in the proposed CGKA protocol are discussed in Section 3. In Section 4, the performance of the proposed protocol is analyzed. Finally, Section 5 concludes this paper.II.L ITERATURE R EVIEWThis section reviews the tree-based CGKA schemes designed for wireless networks as they are applicable to CRMANETs too. This section discusses the CGKA protocols based on both IR and BR approach.The TGDH [17] is the first tree based key agreement protocol that uses a special member called ‗Sponsor‘ to update the group key during membership change. Every member maintains the keys of the nodes in its ‗keypath‘ and ‗copath‘ to calculate the updated group key after receiving a broadcast message from the sponsor. The partition event of TGDH is the most expensive operation and the group key is updated for each join and leave request.The PACK [18] uses a tree structure called ‗PFMH‘ that combines Partially Full (PF) key tree and Maximum Height (MH) key tree. The protocol refers PF subtree and MH subtree as main tree and join tree respectively. It needs O (1) round for single join operation. But the cost for single leave event is higher than the cost associated with leave event in TGDH [18]. A ternary tree based method proposed in [19] uses a ternary key tree to reduce the overall rekeying cost. Every three members are grouped to form a subgroup and the GDH.2 protocol is used to compute a group key. It restricts the group size, total number of join and leave members.The TFAN [20] uses point multiplication operation in ECDH protocol to compute the group key. It requires less computation and communication cost for calculating the updated group key and it is efficient for partition and merge operations. The CGKA in [21] maintains a balanced binary tree using rotation operations to perform communication over multicast group, and it can support only single join and leave events. It outperforms the protocols such as DH, GDH and TGDH in terms of computational complexity since it uses point multiplication rather than modular exponentiation [21]. GKA protocols with BR approach reduce the cost associated with both the computation and communication during the rekeying process. A temporary join tree is created for new users in [22], JDH [23] and [24], and the new users are moved into the main tree when the join tree is full in [23, 24]. In [22], the temporary tree is inserted at the position of the shallowest leaving node. In JDH, the join algorithm inserts the new user at the root node of the main tree when the join tree is empty.The protocol in [24] uses a key tree with three parts such as a) a dynamic size ‗Queue tree‘ for both join and leave requests, b) a lower capacity ‗Join tree‘ only for join requests and c) a ‗Main tree‘ using several Skinny trees only for leave requests. It uses the residency time of users and it makes sure that the location of both join and leave members are close to the root of the main tree in order to reduce the rekeying cost.The methods proposed in [17, 18, 20-24] use binary key tree and the methods [17-19, 22-24] use computationally expensive DH algorithm which are not suitable for CRMANETs. In the above discussed protocols, the joining users should wait until either the join tree becomes full [23, 24] or the total joining users become power of 3 as in the Ternary Tree Based Method [TTBM]. Hence, these existing protocols cannot be applied in CRMANETs with frequent and dynamic membership changes.ECDH protocol is quite suited for resource constrained smaller devices in wireless networks rather than DH [25]. In this paper, ECDH based GDH.2 (GECDH.2) is used to compute the group key.Therefore, a Ternary tree based GECDH.2 (TGECDH.2) protocol which uses BR without any restriction on group size is proposed in this paper. TGECDH.2 uses GECDH.2 for computing the group key and ternary tree is used to reduce the rekeying cost further.III.T ERNARY T REE-B ASED G ECDH.2P ROTOCOL(T GECDH.2)This section discusses the BR algorithms used in the proposed TGECDH.2 protocol for updating the group key during the membership change in CRNs.The performance of a rekeying scheme depends on the structure of the key tree. Ternary tree can reduce the total number of rounds and therefore the binary tree is not an efficient data structure for batch rekeying. In [26], Li et al. showed that the balanced ternary tree is the optimal key tree when the group size is a power of 3. Also, the ternary tree is an optimal balanced key tree for the arbitrary group size in batch updates [26].This proposed protocol TGECDH.2 replaces the binary key tree used in existing methods with a ternary key tree. To reduce the operations involved in the key tree, TGECDH.2 creates a temporary key tree, only when joining members are greater than leaving members. Thus TGECDH.2 reduces the overall complexity involved in rekeying operations.A. Initial Group Key ComputationTGECDH.2 adopts TGDH for constructing the key tree. The rightmost shallowest node is considered as a sponsor. Initial group size ‗n‘ can be any positive integer. Computation of initial group key for the group with 9 SUs is shown in Fig.1. The group key is computed in a bottom-up fashion. Each set of three SUs forms a separate subgroup and they use 3-party GECDH.2 protocol to compute a Sub Group key (SG). After calculating the SG, each sponsor of a subgroup broadcasts it to the next subgroup. Finally, the sponsor of the whole group calculates the final Group key (G) and broadcasts the blinded keys to other SUs. This G is used to encrypt and decrypt the data and thus the secure communication can be achieved between SUs in the group.Fig.1. Initial group key computationB. Interval-based BR MethodThe BR methods in [22-24] insert the new members into a temporary tree upon receiving the join requests during the current rekeying interval. Unlike these methods, the TGECDH.2 protocol creates the temporary tree only when it is required.TGECDH.2 works with the following assumptions:∙Both SUs and PUs can access the band simultaneously within a licensed spectrum usingthe U nderlay approach.∙ A strong digital signature method is used to prevent access to the messages fromeavesdroppers.TGECDH.2 maintains two ternary logical key trees such as a Main Key Tree (MKT) for the current group members and a Temporary Key Tree (TKT) for thejoining SUs. It also maintains a queue to store the newly arrived joining SUs. Depending on the variations in the join and leave events, the TKT is created if necessary at the end of the current rekey interval.The proposed TGECDH.2 protocol uses three algorithms, namely, Ternary_Batch_ Process (TBP), Ternary_Batch_Merge (TBM) and Ternary_Join_Tree (TJT) and these algorithms are given in Alg.1, Alg.2 and Alg.3 respectively.TGECDH.2 consists of two phases such as Preprocess and Merge. In Preprocess phase, all join and leave requests received during the current rekeying interval are stored in the queue. At the end of the current rekeying interval, the total number of join requests or members (J) is compared with the total number of leave requests or members (L).In the Preprocess phase, the TBP algorithm considers 5 possibilities of join and leave events grouped in two cases. Case 1 is used when J>L & L=0 and Case 2 is used when L>0. In Case 1, a TKT is created for the joining members using TJT algorithm. The TBP algorithm finds the appropriate Insertion Point (IP) at which the height of the MKT is not increased during insertion. In the first 3 conditions of Case 2, the functions such as creation of TKT, sponsor selection and computation of GECDH.2 in TKT are avoided so that the overhead involved in rekeying is also reduced. The TKT is created only when J>L.In the Merge phase, the TBM algorithm inserts the created TKT at the chosen IP. Then the sponsor computes the updated group key and it broadcasts the updated blinded keys of the nodes in its key path. Upon receiving this message, the other SUs in the group compute the new group key. The abbreviations used in the proposed three algorithms are:Shallowest Intermediate Node (SIN), New Intermediate Node (NIN), Left Child (LC), Middle Child (MC) and list of New Members (NM).Fig.2 illustrates the insertion of TKT into MKT during the Merge phase. Since the root is full, the TBP algorithm tries to find the SIN with NULL link. As middle SIN has NULL link, it is selected as IP and TKT is inserted here. While choosing the IP, TBP selects the appropriate one, such that it maintains the balanced key tree that helps in reducing the overall rekeying cost. The new sponsor M19 will compute the new group key and it will broadcast the updated blinded keys of the nodes in its key path.When the total number of join members is equal to the total number of leaving members, Case 2 in TBP algorithm will replace all the leaving members with the joining members. It maintains the association between J and L. TBP starts the replacement from the lowest level of the key tree in the left to right direction. The replacement of L with J is shown in Fig.3. The leaving members M1, M3, M8 and M11 are replaced by the four joining members M15, M16, M13 and M14 respectively. Then the sponsors M2, M9 and M12 re-compute the newgroup key and it will be stored in the root of the key tree.A LGORITHM1.T ERNARY_B ATCH_P ROCESSA LGORITHM 2.T ERNARY_B ATCH_M ERGEA LGORITHM 3.T ERNARY_J OIN_T REEFig.2. Merging of created TKT with MKT during Batch RekeyingFig.3 Replacement of leaving members with joining members during Batch RekeyingI V.P ERFORMANCE A NALYSISThis section compares the performance of the proposed TGECDH.2 protocol with existing IR based TTBM. The metrics such as the initial group key generation time and rekeying time are used to analyze the computational complexity, whereas the number of renewed nodes indicates the communication complexity. In Fig.4, Fig.5 and Fig.6, the group size is represented in the x-axis whereas initial group key generation time and the number of renewed nodes are indicated in the y-axis. The difference in initial group key generation time between TGECDH.2 and TTBM is shown in Fig.4. As TGECDH.2 uses ECDH protocol in GDH.2, it reduces the time for generating the initial group key for the initial group members. TTBM restricts the group size and it should be a power of 3. But TGECDH.2 can create a group for any number of members. Fig.4 shows that a group key for the group with 300 members was generated in TGECDH.2 and the same group was not accepted in TTBM.Fig.4. Performance comparison based on initial key generation time.The different values for join and leave were considered and the total number of renewed nodes was measured for different group sizes during rekeying operation. The BR mechanism was not employed in TTBM. The new members were inserted in the main key tree one by one and the leaving members were allowed to leave from the group one at a time. This increased the number of times rekeying is to be done and also the total number of modular exponentiations. Fig.5 depicts the performance difference between these two methods in terms of total number of renewed nodes.Fig.5. Comparison of renewed nodes among TGECDH.2 and TTBM Fig.5 illustrates that TGECDH.2 has less number of renewed nodes when compared to the existing method TTBM. Less than 50 nodes were generated even in a large group with 35 (243) members. But, more than 250 renewed nodes were generated for the group with the same size in TTBM. This is due to individual rekeying operations.The number of joining members was varied for a constant number of leaving members, and the total number of renewed nodes was measured. Fig.6 represents the variations in the number of renewed nodes for different number of joining members. Here, the total number of leaving members considered was 34(81) and the total number of members joining the group at different point of time was considered to be 3i, for 0≤ i≤4.Fig.6 Number of renewed nodes at different joins with fixed leave.The number of renewed nodes is high in TTBM when compared to TGECDH.2 as shown in Fig. 6. There is only a slight increment in the number of renewed nodes in TGECDH.2 when the group size is increased.In Fig.7 and Fig.8, the x-axis shows the total number of joining members (J), while the y-axis represents the total number of leaving members (L). The z axis indicates the measured rekeying time and total number of renewed nodes calculated during BR process. A group with 35 (243) members was considered at the beginning of each observation. The test cases with different values of join and leave members were considered.Fig.7 and Fig.8 compare the performance of TGECDH.2 and TTBM during the rekeying process. The different values for leave were considered by keeping the join value as constant and vice versa. The time for generating the new group keys and the number of renewed nodes were measured.Fig.7. Performance comparison based on rekeying time Fig.7 shows that the TGECDH.2 requires less rekeying time than TTBM for generating the new group key. The rekeying time of TTBM is increased when the group size is increased. From the graph, it is inferred that even for a large value of J and L, the rekeying time in TGECDH.2 is less when compared to IR method TTBM.Fig.8. Performance comparison based on number of renewed nodes.The number of renewed nodes is also less in TGECDH.2 when compared to TTBM as shown in Fig.8. The total number of renewed nodes for large value of J and L in IR method is greater than the value obtained in TGECDH.2.From the above graphs, it is inferred that the proposed TGECDH.2 protocol outperforms TTBM, as TGECDH.2 uses ECDH rather than DH and it pre-processes Js and Ls using its BR approach. Further, the rekeying cost depends on the structure of the key tree and the TBP algorithm always tries to maintain the balanced key tree by finding the appropriate IP where the height of the key tree is not increased. It is clear from the performance analysis that, there is a significant reduction both in computation and communication cost when the values for J and L are large, i.e., in dynamic group. Based on the obtained results, it can be inferred that the TGECDH.2 performs better and reduces both computational and communication complexity compared to TTBM. Therefore, TGECDH.2 protocol is suitable for small devices with less battery power in CRMANETs.V.C ONCLUSIONThe proposed CGKA protocol TGECDH.2 reduces both computational and communication complexity in group key agreement for secure communication between CR users. The TGECDH.2 protocol is best suited for highly dynamic groups with frequent membership changes in resource restricted CRMANETs. Hence, this protocol can be applied to portable mobile devices such as tablet PCs, smart phones, pocket size PCs used in several applications such as video conferences, virtual classrooms, etc.R EFERENCES[1]J. Mitola, ―Cognitive Radio for Flexible MobileMultimedia Communications,‖ i n Proc. IEEE International Workshop on Mobile Multimedia Communications (MoMuC), 1999, pp. 3–10.[2] A. M. Wyglinski, M. Nekovee and Y. T. Hou, ―CognitiveRadio Communications and Networks: Principles and Practice‖, Elsevier, December 2009.[3]Sazia Parvin, Farookh Khadeer Hussain , Omar KhadeerHussain , Song Han , Biming Tian, and Elizabeth Chang, ― Cognitive Radio Network Security: A Survey‖, Journal of Network and Computer Applications, vol. 35, pp. 1691-1708, 2012.[4] C.K. Wong, M. Gouda, and S. S. Lam, ―Secure GroupCo mmunications using Key Graphs,‖ IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, 2000.[5]Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victorwenand David E. Culler, ―SPINS: Security Protocols for Sensor Networks,‖ Wireless Networks, vol. 8, no. 5, pp.521–34, Sept. 2002.[6] A. Khalili, J. Katz, and W. A. Arbaugh, ―Towards SecureKey Distribution in Truly Ad-Hoc Networks,‖in Proc.IEEE International Symposium on Applications and the Internet Workshop, 2003, pp. 342-346.[7]S. Yi, and R. Kravets, ―Composite Key Management forAd Hoc Networks,‖ Proc. Mobiquitous‗04, 2004. [8]R. Anderson, H. Chan, and A. Perrig, ―Key infection:Smart Trust for Smart Dust,‖in proc. 12th IEEE International Conference on Network Protocols, ICNP‘04, 2004, pp. 206–15.[9]S. Capkun, J. P. Hubaux, and L. Buttyán, ―Mobility HelpsPeer-to-Peer Security,‖ IEEE Transactions on Mobile Computing, vol. 5, no. 1, pp. 43–51, Jan. 2006.[10]W. Diffie, and M. E. Hellman, ―New Directions inCryptography,‖ IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644–54, Nov. 1976.[11]N. Koblitz, ―Elliptic Curve Cryptosystems‖, Mathematicsof Computation, vol. 48, no. 177, pp. 203–209, 1987. [12]M. Burmester, and Y. Desmedt, ―A Secure and EfficientConference Key Distribution System,‖ Proc.EUROC RYPT‘94, 1994, pp. 275–86.[13]M. Steiner, G. Tsudik, and M. Waidner, ―Diffie-HellmanKey Distribution Extended to Group Communication,‖ in Proceedings of the 3rd ACM conference on Computer and Communications Security. 1996, pp. 31–37, ACM Press. [14]Certicom Corp. ―MQV: Efficient and Authenticated KeyAgreement,‖ Code & Cipher, Certicom‘s Bulletin of Security and Crypto Graphy,‖ Crypto Column, vol. 1, no. 2, 2004.[15]Y. Wang, ―Efficient Identity-Based and Authenticated KeyAgreement Protocol,‖ Cryptology eprint Archive, Report 2005/108, 2005.[16]M. Cagalj, S. Capkun, and J. P. Hubaux, ―Key Agreementin Peer-to-Peer Wireless Networks,‖ Proc. IEEE, vol. 94, no. 2, Feb. 2006, pp. 467–478.[17]Y. Kim, A. Perrig and G. Tsudik, Simple and Fault-Tolerance Key Agreement for Dynamic Collaborative Groups, in: Proc. of 7th ACM Conference on Computer and Communications Security, 2000, pp. 235–244.[18]W. Yu, Y. Sun and K.J.R Liu, ―Optimizing the RekeyingCost for Contributory Group Key Agreement Schemes‖, IEEE Transactions on Dependable and Secure Computing.4:3, pp. 228-242, 2007.[19]S. Tripathi and G.P. Biswas, G.P.: Design of EfficientTernary-Tree Based Group Key Agreement Protocol for Dynamic Groups. In: Communication Systems and Networks and Workshops, IEEE press, 2009, pp. 1-6. [20]L. Liao a nd M. Manulis, ―Tree-Based Group KeyAgreement Framework for Mobile Ad-Hoc Networks‖, IEEE Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA‘06), 2006, IEEE Press, pp. 5-9.[21]Hua-Yi Lin and Tzu-Chiang Chiang, ―Efficient KeyAgreements in DynamicMulticast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks‖, Hindawi Publishing Corporation, EURASIP Journal on Wireless Communications and Networking, 15 pages, Article ID 382701, vol. 2011.[22]P.C. Lee, C.S. Lui and K.Y. Yau, ―DistributedCollaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups‖, IEEE/ACM Transactions on Networking, vol.14, no. 2, pp. 263-276, 2006.[23]Xiaozhuo Gu, Jianzu Yang, Jing Yu and Julong Lan, ―Join-Tree-Based Contributory Group Key Management‖, in the Proc. The 10th IEEE International Conference on High Performance Computing and Communications, 2008, pp.564-571.[24]Chii-jyh Guo and Yuh-ming Huang, ―Residency-BasedDistributed Collaborative Key Agreement For Dynamic Peer Groups‖, International Journal of Innovative Computing, Information and Control, vol.8, no.8, pp.5523-5542, 2012.[25] The National Security Agency (NSA)/ The CentralSecurity Service (CSS), /business/ programs/elliptic_curve.shtml.[26] Minming Li , Ze Feng, Nan Zang, Ronald L. Graham andFrances F. Yao, ―Approximately Optimal Trees for Group Key Management with Batch Updates‖, Theoretical Computer Science, vol. 410, pp. 1013-1021, 2009.Ms. N. Renugadevi is currently doing Ph.D. in full time at National Institute of Technology, Tiruchirapalli, Tamilnadu, India. Her current research interests include secure group communication and routing in Cognitive radio mobile ad hoc networks. She is a life member of Indian Society for Technical Education (ISTE).Dr. C. Mala is currently serving as an Associate Professor in the Department of Computer Science and Engineering, National Institute of Technology, Trichy, Tamilnadu, India. She received Ph.D from National Institute of Technology, Trichy in 2008. Her research interests include Wireless Networking, Parallel Algorithms, Soft Computing and ImageProcessing.Howtocite this paper: N. Renugadevi, C. Mala,"Ternary Tree Based Group Key Agreement for Cognitive Radio MANETs", IJCNIS, vol.6, no.10, pp.24-31, 2014. DOI: 10.5815/ijcnis.2014.10.03。