{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:39Z","timestamp":1762005099738},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T00:00:00Z","timestamp":1562544000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T00:00:00Z","timestamp":1562544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum. Cent. Comput. Inf. Sci."],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Group key agreement protocol permits a set of users to create a common key to make sure security of information exchange among members of the group. It is extensively used in secure multiparty computation, resource security sharing, and distributed collaborative computing etc. For large wireless ad-hoc network, there is no authentication center, the computing power and communication distance of terminals are constrained, and nodes frequently join and exit the network. For these reasons, Group Key Management for securing multicast communications in an energy-constrained large wireless ad-hoc network environment is still remains a critical and challenging issue. In this direction, we propose a cluster-based hybrid hierarchical-group key agreement (CHH-GKA) framework to provide a scalable solution for Secure Group Communication (SGC) in large wireless ad hoc networks (WANETs). This technique is based on splitting a large group into a certain number of clusters in which the last member of each of the clusters is designated as a cluster head (CH) and the last member of the group is designated as the group controller (GC). First we apply on hand Naresh\u2013Murthy-group key agreement (NM-GKA) protocol locally in every cluster in parallel in level-I to generate CKs and then in level-II, the CHs\u2019 use these CKs and implement NM-GKA protocol again among them to form the complete group key. Finally each CH distributes the group key to all its members through their respective CK encrypted links. In this process, first we survey several cluster-based hierarchical GKA protocols and compare the proposed one with them and show that it provides optimal performance with regard to computation and communication expenses. Further, it also handles dynamic events and is provably secure in formal security model under the cryptographic suppositions.<\/jats:p>","DOI":"10.1186\/s13673-019-0186-5","type":"journal-article","created":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T09:16:10Z","timestamp":1562577370000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks"],"prefix":"10.1186","volume":"9","author":[{"given":"Vankamamidi S.","family":"Naresh","sequence":"first","affiliation":[]},{"given":"Sivaranjani","family":"Reddi","sequence":"additional","affiliation":[]},{"given":"Nistala V. E. S.","family":"Murthy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,8]]},"reference":[{"issue":"8","key":"186_CR1","first-page":"85","volume":"5","author":"M E-Bashary","year":"2015","unstructured":"E-Bashary M, Abdelhafez A, Anis W (2015) A comparative study of group key management in MANET. Int J Eng Res Appl 5(8):85\u201394","journal-title":"Int J Eng Res Appl"},{"key":"186_CR2","doi-asserted-by":"crossref","unstructured":"Boneh D, Franklin M (2001) Identity-based encryption from weil pairing. In: Proceedings of crypto 2001, LNCS, vol 2139. Springer-Verlag, Berlin, pp 213\u2013229","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"3","key":"186_CR3","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ipl.2005.01.003","volume":"94","author":"M Burmester","year":"2005","unstructured":"Burmester M, Desmedt Y (2005) A secure and scalable group key exchange system. Inf Process Lett 94(3):137\u2013143","journal-title":"Inf Process Lett"},{"key":"186_CR4","unstructured":"Manulis M. Security-focused survey on group key exchange protocols. http:\/\/eprint.iacr.org\/2006\/395"},{"key":"186_CR5","doi-asserted-by":"crossref","unstructured":"Scott M, Costigan N, Abdulwahab W. Implementing cryptographic pairings on smart cards. http:\/\/www.iacr.org\/2006\/144","DOI":"10.1007\/11894063_11"},{"key":"186_CR6","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"Paulo S. L. M. Barreto","year":"2002","unstructured":"Barreto PSLM, Kim HY, Scott M (2002) Efficient algorithms for pairing based cryptosystems. In: Proceedings of crypto 2002, LNCS, vol 42. Springer-Verlag, Berlin, pp 354\u2013368"},{"issue":"5","key":"186_CR7","doi-asserted-by":"publisher","first-page":"2007","DOI":"10.1109\/TIT.2008.920224","volume":"54","author":"R Dutta","year":"2008","unstructured":"Dutta R, Barua R (2008) Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans Inf Theory 54(5):2007\u20132025","journal-title":"IEEE Trans Inf Theory"},{"key":"186_CR8","first-page":"74","volume-title":"Lecture Notes in Computer Science","author":"Ratna Dutta","year":"2005","unstructured":"Dutta R, Barua R (2005) Constant round dynamic group key agreement. In: Proceedings of ISC 2005, LNCS, vol 3650, Springer-Verlag, Berlin. pp 74\u201388"},{"key":"186_CR9","unstructured":"Dutta R, Barua R. Overview of key agreement protocols. http:\/\/eprint.iacr.org\/2005\/289"},{"key":"186_CR10","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-540-30191-2_8","volume-title":"Information and Communications Security","author":"Ratna Dutta","year":"2004","unstructured":"Dutta R, Barua R, Sarkar P (2004) Provably secure authenticated tree based group key agreement. In: Proceedings of ICICS\u201904, LNCS, vol 3269. Springer-Verlag, Berlin, pp 92\u2013104"},{"issue":"1","key":"186_CR11","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/984334.984337","volume":"7","author":"Y Kim","year":"2004","unstructured":"Kim Y, Perrig A, Tsudik G (2004) Tree-based group key agreement. ACM Trans Inf Syst Secur 7(1):60\u201396","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"3","key":"186_CR12","first-page":"155","volume":"1","author":"L Kleinrock","year":"1977","unstructured":"Kleinrock L, Kamoun F (1977) Hierarchical routing for large networks; performance evaluation and optimization. Comput Netw 1(3):155\u2013174","journal-title":"Comput Netw"},{"key":"186_CR13","doi-asserted-by":"crossref","unstructured":"Basagni S (1999) Distributed clustering for ad hoc networks. In: Proceedings of the international symposium on parallel architectures, algorithms, and networks (ISPAN), IEEE, Perth, Australia, pp 310\u2013315","DOI":"10.1109\/ISPAN.1999.778957"},{"key":"186_CR14","first-page":"75","volume-title":"Cluster-based networks","author":"M Steenstrup","year":"2001","unstructured":"Steenstrup M (2001) Cluster-based networks. C.E. Perkins, Addison Wesley, Boston, pp 75\u2013138"},{"key":"186_CR15","doi-asserted-by":"crossref","unstructured":"Szczechowiak P, Oliveira L, Scott M, Collier M, Dahab R (2008) NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: 5th European conference on wireless sensor networks\u2014EWSN 2008, lecture notes in computer science, vol 4913. Springer-Verlag, Berlin, pp 305\u2013320","DOI":"10.1007\/978-3-540-77690-1_19"},{"issue":"10","key":"186_CR16","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1002\/sec.1402","volume":"9","author":"VS Naresh","year":"2015","unstructured":"Naresh VS, Murthy NV (2015) Provably secure group key agreement protocol based on ECDH with integrate signature. Secur Commun Netw 9(10):1085\u20131102","journal-title":"Secur Commun Netw"},{"key":"186_CR17","doi-asserted-by":"crossref","unstructured":"Bemmoussat C, Didi F, Feham M (2013) Cluster based routing protocol in wireless mesh network. In: International conference on computer applications technology (ICCAT), Jan 2013, pp 1\u20136","DOI":"10.1109\/ICCAT.2013.6521976"},{"issue":"5","key":"186_CR18","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1002\/wcm.74","volume":"2","author":"EM Belding-Royer","year":"2002","unstructured":"Belding-Royer EM (2002) Hierarchical routing in ad hoc mobile networks. Wirel Commun Mob Comput 2(5):515\u2013532","journal-title":"Wirel Commun Mob Comput"},{"key":"186_CR19","unstructured":"Virtanen SE, Nikander P (2004) Local clustering for hierarchical ad hoc networks. In: Proceedings of WiOpt: modeling and optimization in mobile, ad hoc and wireless networks, pp 404\u2013405"},{"issue":"1","key":"186_CR20","first-page":"90","volume":"4","author":"A Abdel-Hafez","year":"2007","unstructured":"Abdel-Hafez A, Miri A, Oronzo-Barbosa L (2007) Authenticated group key agreement protocols for ad hoc wireless networks. Int J Netw Secur 4(1):90\u201398","journal-title":"Int J Netw Secur"},{"key":"186_CR21","doi-asserted-by":"crossref","unstructured":"Teo JCM, Tan CH (2005) Energy-efficient and scalable group key agreement for large ad hoc networks. In: Proceedings of the 2nd ACM international workshop on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, pp 114\u2013121","DOI":"10.1145\/1089803.1089975"},{"key":"186_CR22","first-page":"324","volume-title":"Lecture Notes in Computer Science","author":"Steven D. Galbraith","year":"2002","unstructured":"Galbraith S, Harrison K, Soldera D (2002) Implementing the Tate pairing. In: Proceedings of algorithm number theory symposium\u2014ANTS V, LNCS, vol 2369. Springer-Verlag, Berlin, pp 324\u2013337"},{"issue":"3","key":"186_CR23","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/SURV.2011.061710.00109","volume":"13","author":"E Klaoudatou","year":"2011","unstructured":"Klaoudatou E, Konstantinou E, Kambourakis G, Gritzalis S (2011) A survey on cluster-based group key agreement protocols for WSNs. IEEE Commun Surv Tutor 13(3):429\u2013442","journal-title":"IEEE Commun Surv Tutor"},{"key":"186_CR24","doi-asserted-by":"crossref","unstructured":"Klaoudatou E, Konstantinou E, Kambourakis G, Gritzalis S (2008) Clustering oriented architectures in medical sensor environments. In: International workshop on security and privacy in e-health, Barcelona, March 2008. IEEE CS Press, pp 929\u2013934","DOI":"10.1109\/ARES.2008.145"},{"key":"186_CR25","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-45203-4_27","volume-title":"Applied Cryptography and Network Security","author":"Gang Yao","year":"2003","unstructured":"Yao G, Ren K, Bao F, Deng RH, Feng D (2003) Making the key agreement protocol in mobile ad hoc network more efficient. In: 1st international conference on applied cryptography and network security\u2014ACNS 2003, lecture notes in computer science, vol 2846. Springer-Verlag, Berlin, pp 343\u2013356"},{"key":"186_CR26","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/11935070_5","volume-title":"Cryptology and Network Security","author":"Hongsong Shi","year":"2006","unstructured":"Shi H, He M, Qin Z (2006) Authenticated and communication efficient group key agreement for clustered ad hoc networks. In: 5th international conference on cryptology and network security\u2014CANS 2006, lecture notes in computer science, vol 4301, Springer-Verlag, Berlin, pp 73\u201389"},{"issue":"4","key":"186_CR27","doi-asserted-by":"publisher","first-page":"2149","DOI":"10.1007\/s11277-016-3366-x","volume":"94","author":"K Gomathi","year":"2017","unstructured":"Gomathi K, Parvathavarthini B, Saravanakumar C (2017) An efficient secure group communication in MANET using fuzzy trust based clustering and hierarchical distributed group key management. Wirel Pers Commun 94(4):2149\u20132162","journal-title":"Wirel Pers Commun"},{"key":"186_CR28","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.entcs.2008.05.005","volume":"192","author":"M Hietalahti","year":"2008","unstructured":"Hietalahti M (2008) A clustering-based group key agreement protocol for ad hoc networks. Electron Notes Theor Comput Sci 192:43\u201353","journal-title":"Electron Notes Theor Comput Sci"},{"key":"186_CR29","unstructured":"Li X, Wang Y, Frieder O (2002) Efficient hybrid key agreement protocol for wireless ad hoc networks. In: Proceedings of IEEE international conference on computer communications and networks, pp 404\u2013409"},{"issue":"3","key":"186_CR30","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1002\/nem.592","volume":"16","author":"A Abdel-Hafez","year":"2006","unstructured":"Abdel-Hafez A, Miri A, Oronzo-Barbosa L (2006) Scalable and fault-tolerant key agreement protocol for dynamic groups. Int J Netw Manag 16(3):185\u2013201","journal-title":"Int J Netw Manag"},{"key":"186_CR31","doi-asserted-by":"crossref","unstructured":"Teo JC, Tan CH (2007) Denial-of-service resilience password-based group key agreement for wireless networks. In: Proceedings of the 3rd ACM work-shop on QoS and security for wireless and mobile networks (Chania, Crete Island, Greece), October 22. ACM, New York, pp 136\u2013143","DOI":"10.1145\/1298239.1298263"},{"issue":"7","key":"186_CR32","first-page":"1","volume":"2013","author":"K Hussain","year":"2013","unstructured":"Hussain K, Abdullah AH, Iqbal S, Awan K, Ahsan F (2013) Efficient cluster head selection algorithm for manet. J Comput Netw Commun 2013(7):1\u20137","journal-title":"J Comput Netw Commun"},{"key":"186_CR33","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-01004-0_6","volume-title":"Transactions on Computational Science IV","author":"Ratna Dutta","year":"2009","unstructured":"Dutta R, Dowling T (2009) Secure and efficient group key agreements for cluster based network. In: Transactions on computational science IV: special issue on security in computing, lecture notes in computer science, vol 5430. Springer-Verlag, Berlin, pp 87\u2013116"},{"key":"186_CR34","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"186_CR35","first-page":"385","volume-title":"Lecture Notes in Computer Science","author":"Antoine Joux","year":"2000","unstructured":"Joux A (2000) A one round protocol for tripartite Diffie\u2013Hellman. In: Algorithmic number theory symposium\u2014ANTS IV, LNCS, vol 1838. Springer-Verlag, Berlin, pp 385\u2013394"},{"key":"186_CR36","doi-asserted-by":"crossref","unstructured":"Steiner M, Tsudik G, Waidner M (1996) Diffie\u2013Hellman key distribution extended to group communication. In: Proceedings of the 3rd ACM conference on computer and communications security. ACM Press, New York, pp 31\u201337","DOI":"10.1145\/238168.238182"},{"key":"186_CR37","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-540-24582-7_15","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"Rana Barua","year":"2003","unstructured":"Barua R, Dutta R, Sarkar P (2003) Extending Joux\u2019s protocol to multi party key agreement. In: Progress in cryptology\u2014INDOCRYPT 2003, lecture notes in computer science, vol 2904. pp 205\u2013217"},{"key":"186_CR38","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1007\/s12046-015-0434-y","volume":"40","author":"VS Naresh","year":"2015","unstructured":"Naresh VS, Murthy NV (2015) A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie\u2013Hellman with privacy preserving public key infrastructure. Sadhana 40:2143\u20132161","journal-title":"Sadhana"},{"key":"186_CR39","doi-asserted-by":"crossref","unstructured":"Chen Y, Zhao M, Zheng S, Wang Z (2006) An efficient and secure group key agreement using in the group communication of mobile ad hoc networks. In: International conference on computational intelligence and security, IEEE Press, pp 1136\u20131142","DOI":"10.1109\/ICCIAS.2006.295441"},{"issue":"4","key":"186_CR40","first-page":"208","volume":"5","author":"ELS Ayman","year":"2014","unstructured":"Ayman ELS (2014) A new hierarchical group key management based on clustering scheme for mobile ad hoc networks. IJACSA 5(4):208\u2013219","journal-title":"IJACSA"},{"issue":"2","key":"186_CR41","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/263876.263885","volume":"27","author":"P. Krishna","year":"1997","unstructured":"Krishna P, Vaidya NH, Chatterjee M, Pradhan DK (1997) A cluster-based approach for routing in dynamic networks. In: ACM SIGCOMM computer communication review, pp 49\u201365","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"5","key":"186_CR42","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.adhoc.2010.08.021","volume":"9","author":"R Dutta","year":"2011","unstructured":"Dutta R, Dowling T (2011) Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks. Ad Hoc Netw 9(5):767\u2013787","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"186_CR43","doi-asserted-by":"publisher","first-page":"153","DOI":"10.4304\/jcp.9.1.153-160","volume":"9","author":"Q Niu","year":"2014","unstructured":"Niu Q (2014) ECDH-based scalable distributed key management scheme for secure group communication. J Comput 9(1):153\u2013160","journal-title":"J Comput"},{"key":"186_CR44","doi-asserted-by":"crossref","unstructured":"Balasubramanian A, Mishra S, Sridhar R (2005) Analysis of a hybrid key management solution for ad hoc networks. In: IEEE wireless communications and networking conference. IEEE Press, New York, pp 2082\u20132087","DOI":"10.1109\/WCNC.2005.1424839"},{"key":"186_CR45","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Jonathan Katz","year":"2003","unstructured":"Katz J, Yung M (2003) Scalable protocols for authenticated group key exchange. In: Advances in cryptology\u2014CRYPTO 2003, lecture notes in computer science, vol 2729. Springer-Verlag, Berlin, pp 110\u2013125"},{"key":"186_CR46","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/3-540-46035-7_21","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2002","author":"Emmanuel Bresson","year":"2002","unstructured":"Bresson E, Chevassut O, Pointcheval D (2002) A dynamic group Diffie\u2013Hellman key exchange under standard assumptions. In: Proceedings of Eurocrypt 2002, LNCS, lecture notes in computer science, vol 2332. pp 321\u2013336"},{"key":"186_CR47","unstructured":"Tan CH, Teo JCM (2006) Energy-efficient ID-based group key agreement protocols for wireless networks. In: 2nd international workshop on security in systems and networks\u2014SSN 2006, IEEE Press, New York"}],"container-title":["Human-centric Computing and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-019-0186-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13673-019-0186-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-019-0186-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T11:42:41Z","timestamp":1627645361000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13673-019-0186-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,8]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["186"],"URL":"https:\/\/doi.org\/10.1186\/s13673-019-0186-5","relation":{},"ISSN":["2192-1962"],"issn-type":[{"value":"2192-1962","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,8]]},"assertion":[{"value":"10 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"26"}}