A dynamic key management paradigm for secure wireless ad hoc network communications

被引:0
作者
Singh A. [1 ]
Tentu A.N. [1 ]
Venkaiah V.Ch. [2 ]
机构
[1] C.R. Rao Advanced Institute of Mathematics, Statistics and Computer Science, University of Hyderabad Campus, Hyderabad
[2] School of Computer and Information Sciences, University of Hyderabad, Hyderabad
关键词
Key management; Key predistribution; MANET; Mobile ad hoc network; Security; Symmetric key management;
D O I
10.1504/ijics.2021.114712
中图分类号
学科分类号
摘要
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes, which are connected each other through wireless links. A mobile ad hoc network (MANET) is a type of self configuring network and have dynamic topology. Since each node in MANET is free to move independently, they can change their links to other nodes frequently. Secure communication among nodes in mobile ad hoc networks is a major concern. Many key management (KM) schemes and protocols have been evolved in past years, but developing fundamentally secure key management scheme for dynamic MANET's is still an open research problem. In this paper, first we reviewed some significant existing KM schemes and compared based on various criterias and design parameters. Next, we have proposed a scheme for pairwise key agreement with updation of key pre-distribution shares while new nodes are getting added to the MANET. Further, we have given our simulation results and performed a comparative analysis based on different simulation's parameters. Future research issues are also discussed at the end of the paper. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:380 / 402
页数:22
相关论文
共 62 条
  • [1] Aboba B., Blunk L., Vollbrecht J., Carlson J., Levkowetz H., Extensible Authentication Protocol (EAP), (2004)
  • [2] Aboba B., Simon D., Eronen P., Extensible Authentication Protocol (EAP) Key Management Framework, (2008)
  • [3] Bai E., Jiang X, A dynamic key management scheme based on secret sharing for hierarchical wireless sensor networks, TELKOMNIKA, 11, 3, pp. 1514-1523, (2013)
  • [4] Bernstein A., Rank One Update and the Google Matrix, (2018)
  • [5] Blom R., An optimal class of symmetric key generation systems, Proc. of EUROCRYPT'84, pp. 335-338, (1985)
  • [6] Bos J.W., Kaihara M.E., Kleinjung T., Lenstra A.K., Montgomery P.L., On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography, IACR Cryptology ePrint Archive 2009/389, (2009)
  • [7] Cao J., Liao L., Wang G., Scalable key management for secure multicast communication in the mobile environment, Pervasive and Mobile Computing, 2, 2, pp. 187-203, (2006)
  • [8] Castelluccia C., Spognardi A., Rok: a robust key pre-distribution protocol for multi-phase wireless sensor networks, Third International Conference on Security and Privacy in Communications Networks and the Workshops, SecureComm 2007, pp. 351-360, (2007)
  • [9] Catakoglu O., Levi A., Uneven key pre-distribution scheme for multi-phase wireless sensor networks, Information Sciences and Systems, Lecture Notes in Electrical Engineering, 264, (2013)
  • [10] Chen C-M., Zheng X., Wu T-Y., A complete hierarchical key management scheme for heterogeneous wireless sensor networks, The Scientific World Journal, 2014, (2014)