Self-configurable key pre-distribution in mobile ad hoc networks

被引:0
|
作者
Castelluccia, C
Saxena, N
Yi, JH [1 ]
机构
[1] Univ Calif Irvine, Sch Informat & Comp Sci, Irvine, CA 92697 USA
[2] INRIA, F-38330 Montbonnot St Martin, France
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present two new schemes that, in the absence of a centralized support, allow a pair of nodes of a mobile ad hoc network to compute a shared key without communicating. Such a service is important to secure routing protocols [1, 2, 3]. The schemes are built using the well-known technique of threshold secret sharing and are secure against a collusion of up to a certain number of nodes. We evaluate and compare the performance of both the schemes in terms of the node admission and pairwise key establishment costs.
引用
收藏
页码:1083 / 1095
页数:13
相关论文
共 50 条
  • [1] Probabilistic distributed key pre-distribution for mobile ad hoc networks
    Chan, ACF
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 3743 - 3747
  • [2] Key pre-distribution using MDS codes in mobile ad hoc networks
    Al-Shurman, Mohammad
    Yoo, Seong-Moo
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 566 - +
  • [3] Probabilistic Key Pre-distribution for Heterogeneous Mobile Ad hoc Networks Using Subjective Logic
    Ahmadi, Mahdieh
    Gharib, Mohammed
    Ghassemi, Fatemeh
    Movaghar, Ali
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 185 - 192
  • [4] Self-configurable fault monitoring in ad-hoc networks
    Badonnel, Remi
    State, Radu
    Festor, Olivier
    [J]. AD HOC NETWORKS, 2008, 6 (03) : 458 - 473
  • [5] Self-configurable Authentication Mechanism with Verifiability in Wireless Ad hoc Networks
    Yi, Jeong Hyun
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [6] Pairwise key establishments without key pre-distribution for mobile ad hoc network environment
    Wang, G.
    Cho, G.
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2006, 153 (06): : 822 - 827
  • [7] Deterministic key pre-distribution schemes for mobile ad-hoc networks based on set systems with limited intersection sizes
    Makri, Effie
    Stamatiou, Yannis C.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2006, : 823 - +
  • [8] Securing communication trees in ad hoc sensor networks with polynomial-based key pre-distribution
    Nikodem, Jan
    Nikodem, Maciej
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 518 - 523
  • [9] A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks
    Xiang, Guangli
    Yu, Lu
    Li, Beilei
    Xia, Mengsen
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 325 - 335
  • [10] Secure Key Distribution for Mobile Ad Hoc Networks
    Dawoud, Dawoud S.
    Auxeeliya, Jesudoss
    [J]. IMETI 2010: 3RD INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II (POST-CONFERENCE EDITION), 2010, : 326 - 331