A Trust Based Threshold Cryptography Key Management for Mobile Ad Hoc Networks

被引:0
|
作者
Dahshan, Hisham [1 ]
Irvine, James [1 ]
机构
[1] Univ Strathclyde, Dept Elect & Elect Engn, Glasgow G1 1XQ, Lanark, Scotland
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The characteristics of mobile ad hoc networks cause a number of challenges to security design such as lack of infrastructure, shared wireless medium, stringent resource constraints and highly dynamic topology. Key management is a central aspect for security in mobile ad hoc networks. While central servers generate and distribute the keys in traditional wired networks, distributive key management systems are used in mobile ad hoc networks. Trust establishment and management are essential for any security framework of MANETs. Threshold cryptography has proved to be an effective scheme for key management and distribution. In this paper we propose a trust based threshold cryptography key management scheme for MANETs. In the proposed scheme, threshold cryptography supports security association establishment between mobile nodes in a web of trust. It enables the source and the destination nodes to successfully complete a certificate chain discovery even if the number of trusted nodes in the neighborhood of the requesting nodes is very low. The advantages of the proposed scheme are justified through extensive simulations.
引用
收藏
页码:1090 / 1094
页数:5
相关论文
共 50 条
  • [31] Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks
    Kumar, Adarsh
    Aggarwal, Alok
    Charu
    [J]. CONTEMPORARY COMPUTING, 2012, 306 : 335 - 346
  • [32] Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks
    F. Richard Yu
    Helen Tang
    [J]. Wireless Networks, 2010, 16 : 2169 - 2178
  • [33] Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks
    Yu, F. Richard
    Tang, Helen
    [J]. WIRELESS NETWORKS, 2010, 16 (08) : 2169 - 2178
  • [34] A PUBLIC KEY MANAGEMENT SCHEME AND THRESHOLD-MULTISIGNATURE SCHEME FOR MOBILE AD HOC NETWORKS
    van der Merwe, J.
    Dawoud, D. S.
    McDonald, S.
    [J]. SAIEE AFRICA RESEARCH JOURNAL, 2006, 97 (01): : 82 - 92
  • [35] Threshold cryptography in mobile ad hoc networks under minimal topology and setup assumptions
    Di Crescenzo, Giovanni
    Ge, Renwei
    Arce, Gonzalo R.
    [J]. AD HOC NETWORKS, 2007, 5 (01) : 63 - 75
  • [36] A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network
    Dey, Haimabati
    Datta, Raja
    [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 400 - 409
  • [37] Energy and Mobility Based Group Key Management in Mobile Ad Hoc Networks
    Priyadharshini, M. Ramya
    Prasanna, S.
    Balaji, N.
    [J]. 2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [38] A Group-Based Key Management Protocol for Mobile Ad Hoc Networks
    Chen, Qing
    Lin, Xiaodong
    Shen, Sherman
    Hashimoto, Kazuo
    Kato, Nei
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 4305 - +
  • [39] Distributed symmetric key management for mobile ad hoc networks
    Chan, ACF
    [J]. IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2414 - 2424
  • [40] A composite key management scheme for mobile ad hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 575 - 584