A secure pairwise key establishment scheme in wireless ad hoc networks

被引:0
|
作者
Kim, TaeYeon [1 ]
Park, HeeMan [2 ]
Lee, HyungHyo [3 ]
机构
[1] Seonam Univ, Dept CS & Informat Commun, Namwon, South Korea
[2] Chonnam Natl Univ, Dept Informat Secur, Gwangju, South Korea
[3] Wonkwang Univ, Div Informat & EC, Iksan, South Korea
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc networks are exposed to numerous security threats that can adversely affect the success of important applications. Security services such as authentication and key management are important to secure the communication between two nodes in the networks. In the existing key pre-distribution schemes, each node is equipped with a weak authentication mechanism to identify neighboring nodes. During the secret key discovery phase, when any two nodes share at least one key information, one node considers the other side to be worthy of confidence and discloses all the shared information to it without a doubt. These schemes are vulnerable to active attack from authorized nodes as well as unauthorized nodes. This paper proposes a novel key management scheme: each node reduces the disclosure of the shared key information and the network provides strong authentication and privacy. Performance and security analyses have proven that our scheme is suitable for ad hoc networks in terms of availability and security aspects.
引用
下载
收藏
页码:1243 / +
页数:2
相关论文
共 50 条
  • [41] A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks
    Zefreh, Mohammad Sheikh
    Fanian, Ali
    Sajadieh, Sayyed Mahdi
    Khadivi, Pejman
    Berenjkoub, Mehdi
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 585 - 592
  • [42] Secure mutual authentication for ad hoc wireless networks
    Kim Byung-Gi
    Sang-Sun Hong
    The Journal of Supercomputing, 2005, 33 (1-2) : 123 - 132
  • [43] On Exploring the Secure Connectivity of Wireless Ad Hoc Networks
    Lu, Dianjie
    Zhang, Guijuan
    Liu, Hong
    PERVASIVE COMPUTING AND THE NETWORKED WORLD, 2014, 8351 : 412 - +
  • [44] Secure Coded Caching in Wireless Ad Hoc Networks
    Kiskani, Mohsen Karimzadeh
    Sadjadpour, Hamid R.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 387 - 391
  • [45] Secure Mutual Authentication for Ad hoc Wireless Networks
    Byung-Gi Kim
    Sang-Sun Hong
    The Journal of Supercomputing, 2005, 33 : 123 - 132
  • [46] Designing secure wireless mobile ad hoc networks
    Balakrishnan, V
    Varadharajan, V
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 5 - 8
  • [47] Secure data forwarding in wireless ad hoc networks
    Huang, Q
    Avramopoulos, IC
    Kobayashi, H
    Liu, B
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 3525 - 3531
  • [48] The Multiple-Key Blom's Scheme for Key Establishment in Mobile Ad Hoc Sensor Networks
    Yang, Mee Loong
    Al-Anbuky, Adnan
    Liu, William
    2013 19TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC): SMART COMMUNICATIONS TO ENHANCE THE QUALITY OF LIFE, 2013, : 427 - 432
  • [49] Secure Key Distribution for Mobile Ad Hoc Networks
    Dawoud, Dawoud S.
    Auxeeliya, Jesudoss
    IMETI 2010: 3RD INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II (POST-CONFERENCE EDITION), 2010, : 326 - 331
  • [50] Secure mutual authentication for ad hoc wireless networks
    Kim, BG
    Hong, SS
    JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 123 - 132