rounds. In this protocol the number of rounds
increases linearly with joining events, the last
member joining the group (the controller) may be a
single point of failure. The order in which packets
are transmitted must be properly defined.
Nevertheless, these protocols have the advantage of
consuming less bandwidth and managing partition
events efficiently.
Figure 1: IKA.1 round i; Mi
member sending a set of
collected values in an upflow message to Mi+1, i ∈ [1,n-
1].
Another group DH extension protocol is
Octopus. It’s extending the 2
nd
-hypercube protocol
(K.Becker, U. Wille, 1998) to unlimited number of
members. In Octopus, n members are divided in five
subgroups. Four members A,B,C and D become
controllers of four subgroups G
A
,G
B
,G
C
,G
D
and the
n-4 remaining members are distributed among this
subgroups in a rectangular way. Every controller
collects each subgroup member contribution k
i
in a
2-party Diffie-Hellman key exchange
,
computes a
subgroup key and exchanges this key in a 4-party
Diffie-Hellman with its neighbouring controllers.
Figure 2: Octopus four party key agreement protocol
steps.
The third contribution is the Tree-Group Diffie-
Hellman (TGDH) proposed by Yondae Kim, Adriane
Perrig and Gene Tsudik. TGDH is a contributive tree
key management protocol which comes to optimize
the performances of the IKA1/2 (
Michael Steiner,
Gene Tsudik, Michael Waidner, 1998)
. It is similar to
OFT (One Way Function Trees) (D. Balenson, D.
McGrew and A. Sherman, 2000) but each member can
act as sponsor depending on his position in the key
tree. The sponsor is responsible for the computation
and the broadcasting of intermediate node keys to
other members of the group. It is the rightmost
member of the subtree or the rightmost member of
the deepest subtree associated with the incoming or
the leaving node. In the partitioning event, they may
be several sponsors in the process of building a new
group key.
When a membership event occurs, the sponsor
changes his own share, computes keys on his keys
path and blinded keys on his co-path from the leaves
to the root and broadcast blinded key tree. All
members update the key tree and compute the group
key.
TGDH is not suitable for mobile ad hoc
networks since the mobility of nodes might make it
impossible for a simple node to broadcast a message
to all members. Therefore, to operate properly, the
network must be restricted so that nodes stay
relatively close to each other throughout the entire
multicast session so for instance, the bandwidth
problem is resolved (
Maria Striki, John S. Baras, 2003).
The mobility of node can cause frequent link
breakage, involving multiple partitioning events that
may lead to a deeply unbalanced tree. Modular
exponentiation is the most expensive operation in
this protocol and depends on the key structure. In a
deep unbalanced key tree, if a deepest node leaves, it
might require O(n) exponentiations to compute the
group key. Also, the broadcasting of the whole tree
in membership events seems to be unnecessary and
the protocol uses a lot of bandwidth notably in
partitioning events. So, maintaining a well balanced
tree almost in high dynamic environments such as ad
hoc networks might maintain the computation cost
to O(log(n)). The authors of TGDH did not describe
the initialization phase.
Figure 3: TGDH: Sponsor broadcasting new blinded key
tree in leaving event.
Let g be a generator of a cyclic finite group G
of order q, A, B, C and D the four subgroups
controllers, k
a
, k
b
, kc, k
d
their respective
subgroups keys. The protocol operates as
shown below:
Step 1: A and B, C and D exchanges their keys
and compute the first round keys k
1
= g
k
a
*
k
b
and
k
2
= g
k
c
*
k
d
Step 2: A and C, B and D exchanges the keys
obtained in step1 and compute the group key
k = g
(k
1
*
k
2
)
Let g be a generator of a cyclic finite group G
of order q and S
i
a random contribution of
member M
i,
IKA.1 round i appears as follow:
M
i
M
i+1
{
gS1*S2***Si/S
k
/ k∈[1,i] }, g
S
1
* S
2
***S
i
Let M
s
be the sponsor, G* = {M
1
..M
n
}-{M
L
}
the group of remaining members in a leaving
event and T(BK*) the new blinded tree, the
protocol operate as follow:
M
s
T(BK*) G*
MULTICAST KEY AGREEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
87