Symmetric key management for mobile ad hoc networks using novel secure and authenticated key distribution protocol-revised

被引:0
|
作者
Jegatheesan, A. [1 ]
Manimegalai, D. [2 ]
机构
[1] Cape Inst Technol, IT Dept, Levengipuram, Tamil Nadu, India
[2] Natl Engn Coll, IT Dept, Kovilpatti, Tamil Nadu, India
关键词
MANET; symmetric key; authentication; secured hash;
D O I
10.1504/IJESDF.2014.065738
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wireless nature of communication and lack of security infrastructure raises several security problems in MANET. So, security routing is essential for mobile ad hoc networks. A number of routing methods have been proposed for security routing. The key idea in our algorithm is to explore key authentication at the time of key sharing. Authentication is performed for key distribution and communication. This paves an integrity and authenticity. Collisions of source and destination nodes are reduced and internal and external attacks are overcome using less cryptographic techniques with less computation steps. Confidentiality is achieved by encrypting the keys. A novel symmetric key sharing method is proposed which emphasises the efficient and secure key sharing and key updates. In our scheme, digital signature and symmetric key combine together and protects the efficiency aspects. Through extensive simulation analysis it is inferred that our algorithm provides an efficient approach towards security and in the mobile ad hoc network.
引用
收藏
页码:268 / 284
页数:17
相关论文
共 50 条
  • [1] Authenticated Symmetric Key Distribution For Mobile Ad Hoc Networks
    Dahshan, Hisham
    Irvine, James
    2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 847 - 852
  • [2] Secure Authenticated Key Establishment Protocol for Ad hoc Networks
    Prakash, A. John
    Uthariaraj, V. Rhymend
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 87 - 94
  • [3] An authenticated key agreement protocol for mobile ad hoc networks
    Zou, Xukai
    Thukral, Amandeep
    Ramamurthy, Byrav
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 509 - +
  • [4] Secure group key management protocol for mobile ad hoc networks
    Selvakumar, K.
    Seethalakshmi, N.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 11989 - 11995
  • [5] Secure group key management protocol for mobile ad hoc networks
    K. Selvakumar
    N. Seethalakshmi
    Cluster Computing, 2019, 22 : 11989 - 11995
  • [6] Secure Key Distribution for Mobile Ad Hoc Networks
    Dawoud, Dawoud S.
    Auxeeliya, Jesudoss
    IMETI 2010: 3RD INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II (POST-CONFERENCE EDITION), 2010, : 326 - 331
  • [7] A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    Lu, Rongxing
    Cao, Zhenfu
    Wang, Licheng
    Sun, Congkai
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 521 - 527
  • [8] A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks
    He, Daojing
    Chen, Chun
    Ma, Maode
    Chan, Sammy
    Bu, Jiajun
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (04) : 495 - 504
  • [9] Secure and Efficient Key Management Protocol in Ad hoc Networks
    Zhang Chuanrong
    Zhang Yuqing
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 986 - +
  • [10] Secure and efficient key management in mobile ad hoc networks
    Wu, Bing
    Wu, Jie
    Fernandez, Eduardo B.
    Ilyas, Mohammad
    Magliveras, Spyros
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 937 - 954