A Trust Based Threshold Cryptography Key Management for Mobile Ad Hoc Networks

被引:0
|
作者
Dahshan, Hisham [1 ]
Irvine, James [1 ]
机构
[1] Univ Strathclyde, Dept Elect & Elect Engn, Glasgow G1 1XQ, Lanark, Scotland
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The characteristics of mobile ad hoc networks cause a number of challenges to security design such as lack of infrastructure, shared wireless medium, stringent resource constraints and highly dynamic topology. Key management is a central aspect for security in mobile ad hoc networks. While central servers generate and distribute the keys in traditional wired networks, distributive key management systems are used in mobile ad hoc networks. Trust establishment and management are essential for any security framework of MANETs. Threshold cryptography has proved to be an effective scheme for key management and distribution. In this paper we propose a trust based threshold cryptography key management scheme for MANETs. In the proposed scheme, threshold cryptography supports security association establishment between mobile nodes in a web of trust. It enables the source and the destination nodes to successfully complete a certificate chain discovery even if the number of trusted nodes in the neighborhood of the requesting nodes is very low. The advantages of the proposed scheme are justified through extensive simulations.
引用
收藏
页码:1090 / 1094
页数:5
相关论文
共 50 条
  • [21] A framework for key management in mobile ad hoc networks
    Hadjichristofi, GC
    Adams, WJ
    Davis, NJ
    [J]. ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 568 - 573
  • [22] Game theory based trust management method for mobile ad hoc networks
    Guo, Jing-Jing
    Ma, Jian-Feng
    Li, Qi
    Wan, Tao
    Gao, Cong
    Zhang, Liang
    [J]. Tongxin Xuebao/Journal on Communications, 2014, 35 (11): : 50 - 58
  • [23] Trust management scheme based on community model for mobile Ad hoc networks
    Wang, Zhang-Sheng
    [J]. Chongqing Daxue Xuebao/Journal of Chongqing University, 2011, 34 (08): : 134 - 138
  • [24] Trust in mobile Ad Hoc Networks
    Veeraraghavan, Prakash
    Limaye, Vikram
    [J]. ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 330 - 334
  • [25] Trust Management for Collusion Prevention in Mobile Ad Hoc Networks
    Seredynski, Marcin
    Bouvry, Pascal
    [J]. 2010 IEEE GLOBECOM WORKSHOPS, 2010, : 508 - 513
  • [26] Threshold and Identity Based Group Key Management Protocols in Ad Hoc Networks
    Zhang, Jianmin
    Li, Jian
    [J]. ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 127 - 130
  • [27] An objective trust management framework for mobile ad hoc networks
    Li, Ruidong
    Li, Jie
    Liu, Peng
    Chen, Hsiao-Hwa
    [J]. 2007 IEEE 65TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2007, : 56 - 60
  • [28] Future trust management framework for mobile ad hoc networks
    Li, Jie
    Li, Ruidong
    Kato, Jien
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 108 - 114
  • [29] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks
    Sun, Hua
    Zheng, Xuefeng
    Deng, Zhongjun
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
  • [30] cTrust: Trust Management in Cyclic Mobile Ad Hoc Networks
    Zhao, Huanyu
    Yang, Xin
    Li, Xiaolin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (06) : 2792 - 2806