Optimally-balanced Hash Tree Generation in Ad Hoc Networks

Similar documents
We will show that the height of a RB tree on n vertices is approximately 2*log n. In class I presented a simple structural proof of this claim:

Efficient pebbling for list traversal synopses

Properties of red-black trees

Algorithms. Red-Black Trees

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Solutions. Suppose we insert all elements of U into the table, and let n(b) be the number of elements of U that hash to bucket b. Then.

Uses for Trees About Trees Binary Trees. Trees. Seth Long. January 31, 2010

Cluster Based Group Key Management in Mobile Ad hoc Networks

All Rights Reserved 2017 IJARCET

CSE101: Design and Analysis of Algorithms. Ragesh Jaiswal, CSE, UCSD

SUMMERY, CONCLUSIONS AND FUTURE WORK

6 Distributed data management I Hashing

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Pseudonym Based Security Architecture for Wireless Mesh Network

We assume uniform hashing (UH):

Trees. Q: Why study trees? A: Many advance ADTs are implemented using tree-based data structures.

The Best Keying Protocol for Sensor Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Merkle Tree Traversal in Log Space and Time (2003 Preprint version)

Quake Heaps: A Simple Alternative to Fibonacci Heaps

Figure 1. Clustering in MANET.

Chord-based Key Establishment Schemes for Sensor Networks

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

Overview of Challenges in VANET

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

ISA[k] Trees: a Class of Binary Search Trees with Minimal or Near Minimal Internal Path Length

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

On the Design of QoS aware Multicast Algorithms for Wireless Mesh Network. By Liang Zhao Director of Study: Dr. Ahmed Al-Dubai (CDCS)

On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

AVC College of Engineering, Mayiladuthurai, India

New Forwarding Strategy for Metro Ethernet Networks Based on Hierarchical Addressing

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Cryptography: More Primitives

Lecture 1. 1 Notation

Outline. Definition. 2 Height-Balance. 3 Searches. 4 Rotations. 5 Insertion. 6 Deletions. 7 Reference. 1 Every node is either red or black.

COT 3100 Spring 2010 Midterm 2

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

IJESRT. [Dahiya, 2(5): May, 2013] ISSN: Keywords: AODV, DSDV, Wireless network, NS-2.

EFFICIENT TRAJECTORY PROTOCOL FOR MULTICASTING IN VEHICULAR AD HOC NETWORKS

A Game-Theoretic Framework for Congestion Control in General Topology Networks

Understand how to deal with collisions

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data

CSE 332, Spring 2010, Midterm Examination 30 April 2010

Chordal Graphs: Theory and Algorithms

Reliable Broadcast Message Authentication in Wireless Sensor Networks

AN OPTIMIZED CLUSTER BASED APPROACH FOR MULTI- SOURCE MULTICAST ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS USING OWCA

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

An eccentric coloring of trees

Number of Node Estimation in Mobile Ad Hoc Networks

Chapter 4: Trees. 4.2 For node B :

EXPERIMENTAL EVALUATION TO MITIGATE BYZANTINE ATTACK IN WIRELESS MESH NETWORKS

PERFORMANCE EVALUATION OF AODV AND DSR ROUTING PROTOCOLS IN MANET NETWORKS

DEPLOYMENT OF PERFORMANCE IN LARGE SCALE WIRELESS MESH NETWORK 1

Descriptive Statistics, Standard Deviation and Standard Error

An Optimal Symmetric Secret Distribution of Star Networks 1

Chapter 7 CONCLUSION

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Trees (Part 1, Theoretical) CSE 2320 Algorithms and Data Structures University of Texas at Arlington

Investigation on OLSR Routing Protocol Efficiency

An Efficient Decoding Technique for Huffman Codes Abstract 1. Introduction

The Encoding Complexity of Network Coding

CSC 373: Algorithm Design and Analysis Lecture 4

On the Minimum k-connectivity Repair in Wireless Sensor Networks

ICS 691: Advanced Data Structures Spring Lecture 3

Tree-Based Minimization of TCAM Entries for Packet Classification

Trees! Ellen Walker! CPSC 201 Data Structures! Hiram College!

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

How many leaves on the decision tree? There are n! leaves, because every permutation appears at least once.

International Journal of Scientific Research and Reviews

Slides for Faculty Oxford University Press All rights reserved.

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Binary Search Trees Treesort

PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Verifying a Border Array in Linear Time

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive

CS2223: Algorithms Sorting Algorithms, Heap Sort, Linear-time sort, Median and Order Statistics

A Study on Issues Associated with Mobile Network

CSCI-401 Examlet #5. Name: Class: Date: True/False Indicate whether the sentence or statement is true or false.

Lamé s Theorem. Strings. Recursively Defined Sets and Structures. Recursively Defined Sets and Structures

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Greedy Algorithms CHAPTER 16

Module 4: Index Structures Lecture 13: Index structure. The Lecture Contains: Index structure. Binary search tree (BST) B-tree. B+-tree.

Multi-Way Search Trees

Introduction and Statement of the Problem

Advanced WG and MOWG Stream Cipher with Secured Initial vector

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

CS525 Winter 2012 \ Class Assignment #2 Preparation

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

COMP3121/3821/9101/ s1 Assignment 1

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Transcription:

African Journal of Information and Communication Technology, Vol. 6, No., September Optimally-balanced Hash Tree Generation in Ad Hoc Networks V. R. Ghorpade, Y. V. Joshi and R. R. Manthalkar. Kolhapur Institute of Technology, Kolhapur, India, vijayghorpade@hotmail.com. SGGSIE&T, Nanded, India Abstract Ideally a hash tree is a perfect binary tree with leaves equal to power of two. Each leaf node in this type of tree can represent a mobile node in an ad hoc network. Each leaf in the tree contains hash value of mobile node s identification (ID) and public key (PK). Such a tree can be used for authenticating PK in ad hoc networks. Most of the previous works based on hash tree assumed perfect hash tree structures, which can be used efficiently only in networks with a specific number of mobile nodes. Practically the number of mobile nodes may not be always equal to a power of two and the conventional algorithms may result in an inefficient tree structure. In this paper the issue of generating a hash tree is addressed by proposing an algorithm to generate an optimally-balanced structure for a complete hash tree. It is demonstrated through both the mathematical analysis and simulation that such a tree is optimally-balanced and can efficiently be used for public key authentication in ad hoc networks. Index Terms Hash Tree, Ad Hoc Network, Authentication I. INTRODUCTION In recent years, ad hoc networks have received more attention, because of their easy deployment. However the characteristics of ad hoc networks are more prone to physical security threats than the wired network environment. It includes infrastructure-less architecture, dynamic network topology, energy constrained devices and shared wireless channel. Therefore it has become a primary concern of securing an ad hoc network. Authentication is one of the major topics in network security. For authentication, certificate based approaches are popular in classical networks. Certificate based public key authentication schemes are complicated and requires more computational power and energy. In a resource constrained ad hoc network public key authentication can be done using a hash tree [] which requires less computational power and energy. A complete binary tree also finds applications in various group key generation protocols. A hash tree is perfect binary tree having n leaf nodes with the height of the tree as l, where l is given by l = log n. Each leaf in the tree contains hash value of mobile node s ID and PK. The value of each internal node of the tree is a hash value of the concatenated values of its two child nodes. Such a tree can be used for authenticating PK in ad hoc networks. Most of the previous works that employed the hash trees for public key authentication scheme [,3,4], assumed perfect trees with l leaf nodes, to represent a node from an ad hoc network and did not investigate the tree structure itself. While this assumption may hold in some special cases with l mobile nodes, in other cases when the number of mobile nodes varies dynamically, the conventional algorithms may result in an inefficient tree structure. To solve this problem 7

African Journal of Information and Communication Technology, Vol. 6, No., September an algorithm is presented in [5] for optimal tree construction for any network size. The scheme presented in [5] is analyzed in this paper and a simple algorithm for generating optimally-balanced complete hash tree is proposed for any number of leaf nodes (i.e. n > ). The paper is organized as follows. Section II, presents an analysis of the scheme presented in [5]. In section III, an algorithm to build an optimallybalanced hash tree is proposed. Section IV presents mathematical proofs followed by performance analysis in section V; and section VI concludes this paper. II. PREVIOUS WORK Veronika and Seo [5] in their proposal have presented an algorithm to generate an optimal hash tree structure which can be used in sensor networks for PK authentication; where the number of sensors are not of the order of power of two. If hash trees are used for PK authentication then it is important to minimize the number of nodes with the maximum authentication path (AP), which is a set of siblings by which a root can be reconstructed from the leaf values; and the tree must be as balanced as possible. In [5] a parameter P is presented to measure the degree of optimality by the following probability: n P = () n where P is the probability that a node has AP length less than maximum, and n is the number of nodes in a group with the maximum AP length. It is claimed that the algorithm presented in [5] constructs a tree with the maximum possible probability P for given n, where n is network size. To justify their claim they have given an example of a network with n = and showed that the value of P is maximum in this case. That is, minimum number of nodes have maximum AP length and the value of P becomes 5 %. While analyzing the scheme it is observed that, when the same algorithm is applied in a group with n = 7 and n = 3, then the value of the parameter P becomes 88% and 3.% respectively. From such and similar extreme cases it is clear that with n = l + the parameter P has maximum value and hence the tree is optimized. On the other hand with n = l the value of P is minimum and therefore the tree is not optimized. In [5] it is concluded that, the number of nodes with longest AP is made minimal. These results could not be confirmed in the proposed paper with an appropriate experimental setting. The parameter P presented in [5] does not give any correct information about the optimality of the tree. Also the complexity of the tree generation algorithm presented in [5] is more due to following two reasons: First, the algorithm demands that the tree must be represented in the suggested polynomial form and secondly, it creates sub-trees and then concatenates these sub-trees to form the resulting tree. III. PROPOSED SCHEME While using binary trees for security related applications, such as 8

African Journal of Information and Communication Technology, Vol. 6, No., September PK authentication and group key generation, in ad hoc network; it is important to generate the binary tree as balanced as possible. A complete binary tree is said to be optimally balanced if and only if the leaves are distributed at level l and l only; where l is the height of the complete binary tree and all the leaf nodes on the last level must occupy the leftmost spots consecutively. In this paper a simple algorithm is proposed to generate an optimally-balanced complete hash tree for any group size (i.e. n > ). The proposed algorithm is easy to implement and does not demand to represent the tree in the polynomial form. It generates a single tree from the root node and there is no need of forming sub-trees and then concatenating them to obtain the resulting tree. The proposed algorithm is shown in Figure. Algorithm Given: number of leaf nodes ( n ), height of the complete binary tree l = log n ) and l satisfies ( l < < n l, node index ( v ) Output: Tree(T ) with n leaf nodes. if T = NULL then create root node. set node counter k = ; set level d = ; 3. perform step 3 through while( d < l ) 4. take the leftmost node at level d and make it as current node. set v = ; 5. perform steps 5 through while( v < d ) 6. create left and right child nodes to the current node v 7. increment node counter k by 8. check whether nodes created ( k ) exceeds the total nodes in the tree if( k ( n ) ) stop 9. move to the next node, if present, at the same level d ; make that node as current node;. increment v and go to step 5. increment d. go to step 3 3. end Figure : Optimally-balanced complete hash tree generation algorithm It is proved in Section IV that the tree generated with the proposed algorithm is optimally-balanced in the sense that the leaf nodes of the tree are either at level l or l and the deepest nodes are on the extreme left hand side of the tree. IV. MATHEMATICAL ANALYSIS Theorem: The hash tree built by above algorithm is optimally balanced and complete. Let n be number of leaf nodes in a given complete binary tree. Prove that iff n is not of the order of power of two; then the leaf nodes exist on last and second last level in the tree. Assume, n = p + r where p Ν ( Ν is a set of natural numbers) and n = p. Then it is to prove that r leaves exists on level l and n r leaves exist on level l, where l is the height of the complete binary l = log n. tree given by 9 3

African Journal of Information and Communication Technology, Vol. 6, No., September Intuition: Tree (T ) Leaves ( n ) Height ( l ) l n n l 3 3 5 4 3 6 4 4 n l : # leaves on l th level l n : # leaves on l th level Observation: For every increment in leaf node count, the number of leaf nodes on last level increases by and the number of leaf nodes on second-last level decreases by. Proof: Induction is useful to prove the theorem with trees. Basis: Let n = 3 : p =, r =, l = 3, therefore; n l = r = leaves exist on 3 rd level and n l = n r leaves exist on nd level, and n n l + n = l Inductive Hypothesis: Assume that the theorem is true for leaf nodes n k where k > 3. Inductive step: Let us prove that the inductive hypothesis is true for leaf nodes n = k + Let n = p + r where r = r + p n = + ( r + ) From the basis and inductive hypothesis; n l = r = r + leaves exist on l th level and, n l = n r = n ( r + ) n l = n r leaves exist on l th level but, n = k + therefore, = k + r n l n l = ( k r) th leaves exist on l level Thus, the inductive hypothesis is true for n = k + leaf nodes and, hence 4

African Journal of Information and Communication Technology, Vol. 6, No., September (by induction), true for all leaf node counts. Hence it is proved that the tree built by the proposed algorithm is optimally-balanced and complete. V. PERFORMANCE ANALYSIS Simulation setup: The proposed algorithm is implemented using C++ to build a hash tree and used along with the network simulator (ns-) [6] simulating a Mobile Ad hoc Network (MANET) with different network sizes. Standard cryptographic function SHA from OpenSSL Library [7] is used for computation of hash values which generates a 6 bit hash. The tree thus built is used for public key authentication. The leaf nodes of the tree are attached to the respective mobile nodes from the simulated MANET. Performance Evaluation: This section provides a detailed quantitative analysis of the proposed algorithm. The performance of the proposed algorithm is evaluated using communication overhead and memory requirement per node for public key authentication. The algorithm builds a binary tree which is optimally-balanced for any number of leaf nodes. These balanced trees tend to be bushy : they have few levels and spread out width-wise. Trees that are wide and shallow have only a few levels, precisely log n ; recall that n is the number of leaf nodes. The experiments are conducted for network sizes ranging from 8 to 48 nodes. The proposed scheme is compared with a basic scheme in which the number of nodes are exactly of the order of power of two. A. Communication overhead vs. network size Experimental work shows that, the communication overhead in MANET depends upon the distance and number of hops between two communicating peers, the traffic scenario, quality and bandwidth of the channel etc. In the proposed scheme, in addition to the above factors; the communication overhead is proportional to the height of the tree, while the height of the tree is decided by the number of mobile nodes in the network. Therefore, the size of a network will affect the performance of the scheme. Figure depicts how the network size affects the communication overhead. B. Memory requirement vs. network size Each node holds hash value of the root node and its AP. Since a balanced tree is rather bushy, the number of nodes in the AP are minimal consuming less memory per node. Memory requirement per node changes with the increase in network size. Figure 3 clearly shows the trend of memory requirement with the increase of network size. 5

African Journal of Information and Communication Technology, Vol. 6, No., September 4 3 Communication overhead 8 6 4 M em o ry per n ode (b ytes) 5 5 5 5 5 5 Network size 5 5 5 Network size Proposed scheme Basic scheme Proposed scheme Basic scheme Figure : Communication overhead vs. network size Figure 3: Memory requirement vs. network size VI. CONCLUSIONS A simple algorithm for generating an optimally-balanced complete hash tree is proposed in this paper. Given any number of leaf nodes, the algorithm builds a binary tree. Through mathematical analysis it is shown that the leaf nodes of the generated tree exists only on last and second-last level. Hence, it is concluded that such a tree is optimally-balanced complete hash tree. The complexity and memory requirement of the algorithm is O (n) and it does not demand to represent the nodes in polynomial form to construct the tree. Experimental results show that, when the proposed algorithm is used for public key authentication in MANET; the AP and per node memory requirement remains optimal even though the number of leaf nodes are not of the order of power of two. REFERENCES [] R. C. Merkle, Protocols for Public Key Cryptosystems, in Proc. IEEE Symposium on Research in Security and Privacy, 98. [] W. Du, R. Wang, and P. Ning, An Efficient Scheme for Authenticating Public Keys in Sensor Networks, ACM, MobiHoc, 5. [3] L. Zhou and C. V. Ravishankar, Dynamic Merkel Trees for verifying privileges in Sensor Networks, in Proc. IEEE ICC 6. [4] M. Jakobsson and S. Wetzel, Efficient Attribute Authentication with Applications to Ad hoc Networks, ACM, VANET, 4. [5] V. Kondratieva and S-W Seo, Optimized Hash Tree for Authentication in Sensor Networks, IEEE Communications Letters, Vol., No., Feb. 7. [6] ns- : Network Simulator, available at http://www.isi.edu/nsnam [7] OpenSSL : Standard Cryptographic Library, available at http://www.openssl.org 6