Mitigating eavesdropping attack using secure key management scheme in wireless mesh networks

被引:5
|
作者
Kandah, Farah [1 ]
Singh, Yashaswi [1 ]
Zhang, Weiyi [2 ]
机构
[1] Department of Computer Science, North Dakota State University, Fargo, ND 58105, United States
[2] AT and T Labs - Research, Middletown, NJ 07748, United States
来源
Journal of Communications | 2012年 / 7卷 / SPL.ISS. 8期
关键词
Network security - Wireless mesh networks (WMN) - MESH networking - Public key cryptography - Security systems;
D O I
10.4304/jcm.7.8.596-605
中图分类号
学科分类号
摘要
Wireless mesh network (WMN) is a rapid deployed, self organized and multi-hop wireless networks. However, the wireless and distributed natures of WMN make it subject to various kinds of malicious attacks, which raise a great challenge in securing these networks. Most existing security mechanisms are based on cryptographic keys where a high degree key management services are in demand. In this paper, we present an effective secure key management scheme (SKeMS) which seeks an encryption key assignment such that the induced network is securely key connected and well protected against potential malicious eavesdropping attacks. Compared to previous work, our scheme assigns the available encryption keys among all the nodes in the network. Our simulation results show that our scheme outperforms previous schemes through providing a network that is resistant to malicious eavesdropping attack. © 2012 ACADEMY PUBLISHER.
引用
收藏
页码:596 / 605
相关论文
共 50 条
  • [1] A Secure Key Management Scheme in Wireless Mesh Networks
    Kandah, Farah
    Zhang, Weiyi
    Du, Xiaojiang
    Singh, Yashaswi
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [2] A Secure Key Management Model for Wireless Mesh Networks
    Gao, Li
    Chang, Elizabeth
    Parvin, Sazia
    Han, Song
    Dillon, Tharam
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 655 - 660
  • [3] An attack model based highly secure key management scheme for wireless sensor networks
    Ahlawat, Priyanka
    Dave, Mayank
    6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS, 2018, 125 : 201 - 207
  • [4] A distributed key management scheme for wireless mesh networks
    Fu, Ying-Fang
    He, Jing-Sha
    Luan, Liang-Yu
    Wang, Rong
    Li, Guo-Rui
    Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2009, 35 (03): : 403 - 408
  • [5] Mitigating Sandwich Attacks against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA
    Alzaid, Hani
    Park, DongGook
    Nieto, Juan Gonzalez
    Foo, Ernest
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 859 - 865
  • [6] A secure and efficient key management scheme for wireless sensor networks
    Kim, Yong Ho
    Lee, Hwaseong
    Lee, Dong Hoon
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 162 - 167
  • [7] A Secure Authentication and Key Management Scheme for Wireless Sensor Networks
    Khan, Sarmadullah
    Khan, Rafiullah
    SENSOR SYSTEMS AND SOFTWARE, 2015, 143 : 51 - 60
  • [8] A secure group key management scheme for wireless cellular networks
    Um, Hwayoung
    Delp, Edward J.
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 414 - +
  • [9] A Secure Routing Scheme for Wireless Mesh Networks
    Nanda, Ashish
    Nanda, Priyadarsi
    He, Xiangjian
    Jamdagni, Aruna
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 393 - 408
  • [10] A secure triple-key management scheme for wireless sensor networks
    Zia, Tanveer
    Zomaya, Albert
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 3216 - 3217