Symmetric key management for mobile ad hoc networks using novel secure and authenticated key distribution protocol-revised

被引:0
|
作者
Jegatheesan, A. [1 ]
Manimegalai, D. [2 ]
机构
[1] Cape Inst Technol, IT Dept, Levengipuram, Tamil Nadu, India
[2] Natl Engn Coll, IT Dept, Kovilpatti, Tamil Nadu, India
关键词
MANET; symmetric key; authentication; secured hash;
D O I
10.1504/IJESDF.2014.065738
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wireless nature of communication and lack of security infrastructure raises several security problems in MANET. So, security routing is essential for mobile ad hoc networks. A number of routing methods have been proposed for security routing. The key idea in our algorithm is to explore key authentication at the time of key sharing. Authentication is performed for key distribution and communication. This paves an integrity and authenticity. Collisions of source and destination nodes are reduced and internal and external attacks are overcome using less cryptographic techniques with less computation steps. Confidentiality is achieved by encrypting the keys. A novel symmetric key sharing method is proposed which emphasises the efficient and secure key sharing and key updates. In our scheme, digital signature and symmetric key combine together and protects the efficiency aspects. Through extensive simulation analysis it is inferred that our algorithm provides an efficient approach towards security and in the mobile ad hoc network.
引用
收藏
页码:268 / 284
页数:17
相关论文
共 50 条
  • [31] Distributive key management for mobile ad hoc networks
    Al-Shurman, Mohammad
    Yoo, Seong-Moo
    Kim, Bonam
    MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 533 - +
  • [32] Robust key management for mobile ad hoc networks
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    不详
    Qinghua Daxue Xuebao, 2008, 7 (1194-1197):
  • [33] A framework for key management in mobile ad hoc networks
    Hadjichristofi, GC
    Adams, WJ
    Davis, NJ
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 568 - 573
  • [34] A hierarchical key management scheme for secure group communications in mobile ad hoc networks
    Wang, Nen-Chung
    Fang, Shian-Zhang
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (10) : 1667 - 1677
  • [35] A key management and secure routing integrated framework for Mobile Ad-hoc Networks
    Zhao, Shushan
    Kent, Robert
    Aggarwal, Akshai
    AD HOC NETWORKS, 2013, 11 (03) : 1046 - 1061
  • [36] Key Management Using Chebyshev Polynomials for Mobile Ad Hoc Networks
    K.R.Ramkumar
    Raman Singh
    中国通信, 2017, 14 (11) : 237 - 246
  • [37] Key Management Using Chebyshev Polynomials for Mobile Ad Hoc Networks
    Ramkumar, K. R.
    Singh, Raman
    CHINA COMMUNICATIONS, 2017, 14 (11) : 237 - 246
  • [38] An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks
    Yuan, Wei
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [39] A three round authenticated group key agreement protocol for ad hoc networks
    Augot, Daniel
    Bhaskar, Raghav
    Issarny, Valerie
    Sacchetti, Daniele
    PERVASIVE AND MOBILE COMPUTING, 2007, 3 (01) : 36 - 52
  • [40] Multicast key agreement protocol for mobile ad hoc networks
    Boumso, Andre
    Bensaber, Boucif Amar
    Biskri, Ismail
    Khali, Samir
    WINSYS 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS, 2006, : 86 - 94