Leveraging Social Networks for Key Distribution to Secure Communication in Tactical Military Networks Ahmed Bahjat Guohong Cao Thomas F. La Porta Penn State University University Park, PA {bhajat, gcao, tlp}@cse.psu.edu Bhaskar Krishnamachari University of Southern California Los Angeles, CA bkrishna@usc.edu AbstractCooperative caching in MANETS and forwarding data items through mobile nodes in Delay Tolerant Networks are two important methods for improving performance and providing connectivity in mobile tactical networks. In this paper we present the challenges of securing cooperative caching the DTN systems. Our security solution is based on MML-IPSec. The main challenge of this system is key distribution and its impact on performance. We propose leveraging military structure, knowledge of missions, and the roles of personnel to enable secure systems to maintain high performance. Keywords-caching, DTN, IPSec, key distribution I. INTRODUCTION Mobile Ad Hoc Networks (MANETs) are an important substrate for the exchange of information in military environments. MANETs facilitate local communication amongst soldiers and sharing of information retrieved over backhaul wireless links from central sites, such as command centers. Communication between groups of soldiers, or between deployed soldiers and a command center may also be assisted by a special type of MANET called a Delay Tolerant Network (DTN). DTNs make use of moving nodes, vehicles or soldiers, to physically carry information in situations when wireless communications links are unavailable. The performance of MANETs is limited by the capacity and characteristics of wireless communications links. The performance of DTNs is limited by the ability to correctly select nodes to carry information between groups based on the mobility characteristics of the nodes. When a node in a MANET requests information from a command center, its request is forwarded through peer nodes in the MANET, to a wireless backhaul that provides connectivity to a command center. This request may incur large delays as it traverses the wireless multi-hop MANET, and may cause congestion on the wireless backhaul link. To reduce these performance bottlenecks, in prior work, we introduced the notion of cooperative caching [1][2]. In one version of cooperative caching, nodes within a MANET that have received information, or assisted in retrieving information, store a copy. If further requests to retrieve the same piece of information are routed through a node with a stored local copy, this node may respond to the request directly, thus eliminating the need to send the request all the way to the command center. This reduces the latency of the request and alleviates congestion on the backhaul link. A similar process is used in DTNs. When a node has data to forward to a destination, if the node is in a disconnected network partition, it will place a replica of the data in a set of mobile nodes that may travel towards the destination node to deliver the data. We have previously developed algorithms for selecting the best set of nodes in which to place the replica in vehicular networks which are a special case of DTN [3]. Both cooperative caching in MANETS and placing replicas for delivery in DTNs is an inherently insecure operation. All nodes assisting in the delivery and retrieval of data can see the destination, information requested, and information itself. Providing security for these systems is challenging because participating nodes must be able to determine what information to store. In this paper we propose to use a variant of Mobile Multi- layered IPSec (MML-IPSec) [4][5] to secure tactical MANETs and DTNs. With MML-IPSec packets may be divided into a control zone, which contains the destination addresses and a reference to the data, and a payload zone which carries the data item. Each zone may be encrypted or signed with a different key. We propose a hierarchy of keys be judiciously deployed in nodes that require specific information for a mission. Control zone keys are more widely deployed so that more nodes may assist in the delivery of information. However, because information, such as communicating parties, may be leaked with just the control zone key, even this key should have limited deployment. We show that if keys are not deployed with care, the performance benefits of cooperative caching are largely lost, and that the performance of DTNs seriously degrades. However, if keys are intelligently deployed using information about the “social network” of the soldiers based on knowledge of their missions, secure data transfer may be achieved while maintaining the performance benefits of cooperative caching in MANETs and sophisticated DTN algorithms. The remainder of the paper is organized as follows. In Section II we provide a background on cooperative caching and DTN networks; in Section III we present our solution for The 2010 Military Communications Conference - Unclassified Program - Cyber Security and Network Management 978-1-4244-8179-8/10/$26.00 ©2010 IEEE 1635