A Key Distribution Scheme Using Network Coding for Mobile Ad hoc Network

被引:0
|
作者
Liu, Jianwei [1 ]
Du, Ruiying [2 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[2] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
基金
美国国家科学基金会;
关键词
network coding; key distribution scheme; message authentication code(MAC); wireless ad hoc network;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network coding offers an excellent solution for maximizing throughput in various networks. Because of its simplicity and high efficiency, the idea of network coding can also be used for designing a lightweight key distribution schemes for wireless ad hoc network. This paper presents a key distribution scheme that exploits the inherent security properties of network coding. The new scheme relies on simple XOR network coding operations to provide data confidentiality and uses message authentication codes (MACs) to guarantee the integrity of the distributed keys. We also show that our scheme can resist a series of attacks suffered in wireless ad hoc network and has better performance in comparing with previous schemes proposed in the literature.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A key distribution scheme using network coding for mobile ad hoc network
    Liu, Jianwei
    Du, Ruiying
    Chen, Jing
    He, Kun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (01) : 59 - 67
  • [2] A Safety Group Key Management Scheme in Mobile Ad Hoc Network
    Ye, Yongfei
    Zhao, Xiqing
    Guo, Xifeng
    [J]. PROCEEDINGS OF 2009 8TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY, VOLS I AND II: HIGHLY RELIABLE, EASY TO MAINTAIN AND READY TO SUPPORT, 2009, : 512 - 515
  • [3] Secure Geocast in ad hoc network using Multicasting Key Distribution Scheme (SGAMKDS)
    Palanisamy, V.
    Annadurai, P.
    [J]. IACSIT-SC 2009: INTERNATIONAL ASSOCIATION OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - SPRING CONFERENCE, 2009, : 190 - +
  • [4] Capacity of Network Coding for Mobile Ad Hoc Networks
    Shi, Yan
    Sheng, Min
    Li, Jiandong
    Zhang, Wenbing
    [J]. 2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [5] A distributed key generation for mobile Ad Hoc network
    Liu, Linqiang
    Song, Rushun
    Zhang, Lihua
    [J]. Jisuanji Gongcheng/Computer Engineering, 2006, 32 (06): : 181 - 182
  • [6] An effective authentication scheme in mobile ad hoc network
    Shin, Kiho
    Kim, Yoonho
    Kim, Yanggon
    [J]. SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 249 - +
  • [7] Parallel key management scheme for mobile ad hoc network based on traffic mining
    Lakshmi, R. Pushpa
    Kumar, A. Vincent Antony
    [J]. IET INFORMATION SECURITY, 2015, 9 (01) : 14 - 23
  • [8] Topology Control Using Optimized Clustering Scheme in Mobile Ad Hoc Network
    Agrawal, Shyam Sundar
    Rathi, Rakesh
    [J]. INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2024, 12 (01) : 119 - 130
  • [9] Mobile secret key distribution with network coding
    Oliveira, Paulo F.
    Costa, Rui A.
    Barros, Joao
    [J]. SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 171 - 174
  • [10] Analysis of Different Key-Distribution Schemes for Mobile Ad-hoc Network
    Sanghavi, Vishakha B.
    Sanghvi, Shreya V.
    Tada, Naren V.
    Dubay, Vijay J.
    [J]. 3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,