A NEW KEY MANAGEMENT METHOD FOR AD HOC NETWORKS

被引:0
|
作者
Liu, Chun [1 ]
Liu, Jianwei [1 ]
Zhang, Qishan [1 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100083, Peoples R China
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Some security-sensitive fields like military scenarios are the main application areas of ad hoc networks. In those areas, security issues have to be considered seriously for the network. In this paper, a key management method based on the combined public key is proposed for ad hoc networks. Through this method, private and public key pairs can be distributed to nodes of ad hoc networks efficiently. No certificate or other authentic channel is needed while two nodes perform authentication and key agreement protocol. The key management method is especially suitable for ad hoc networks, which has no fixed infrastructure and has constrained resources.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Analysis of a hybrid key management solution for ad hoc networks
    Balasubramanian, A
    Mishra, S
    Sridhar, R
    2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 2082 - 2087
  • [22] Key Management in Web of Trust for Mobile Ad Hoc Networks
    Dahshan, Hisham
    Irvine, James
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 363 - 370
  • [23] A composite key management scheme for mobile ad hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 575 - 584
  • [24] Secure and efficient key management in mobile ad hoc networks
    Wu, Bing
    Wu, Jie
    Fernandez, Eduardo B.
    Ilyas, Mohammad
    Magliveras, Spyros
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 937 - 954
  • [25] Hierarchical key management for mobile ad-hoc networks
    Budakoglu, C
    Gulliver, TA
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2735 - 2738
  • [26] Security Assessment for Key Management in Mobile Ad Hoc Networks
    Abouhogail, Reham Abdellatif
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 169 - 182
  • [27] Research on Key Management Schemes for Mobile Ad Hoc Networks
    Han Lei
    Liu Ji-qiang
    Han Zhen
    Wei Xue-ye
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 225 - +
  • [28] Public-key management in mobile ad hoc networks
    Lin, Haifeng
    Jiang, Anna
    Bai, Di
    Liu, Yunfei
    PIAGENG 2013: INTELLIGENT INFORMATION, CONTROL, AND COMMUNICATION TECHNOLOGY FOR AGRICULTURAL ENGINEERING, 2013, 8762
  • [29] A Robust and Redundant Key Management for Mobile Ad Hoc Networks
    Dahshan, Hisham
    Irvine, James
    2009 6TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS 2009), 2009, : 433 - 437
  • [30] Secure and Efficient Key Management Protocol in Ad hoc Networks
    Zhang Chuanrong
    Zhang Yuqing
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 986 - +