Mitigating eavesdropping attack using secure key management scheme in wireless mesh networks

被引:5
|
作者
Kandah, Farah [1 ]
Singh, Yashaswi [1 ]
Zhang, Weiyi [2 ]
机构
[1] Department of Computer Science, North Dakota State University, Fargo, ND 58105, United States
[2] AT and T Labs - Research, Middletown, NJ 07748, United States
来源
Journal of Communications | 2012年 / 7卷 / SPL.ISS. 8期
关键词
Network security - Wireless mesh networks (WMN) - MESH networking - Public key cryptography - Security systems;
D O I
10.4304/jcm.7.8.596-605
中图分类号
学科分类号
摘要
Wireless mesh network (WMN) is a rapid deployed, self organized and multi-hop wireless networks. However, the wireless and distributed natures of WMN make it subject to various kinds of malicious attacks, which raise a great challenge in securing these networks. Most existing security mechanisms are based on cryptographic keys where a high degree key management services are in demand. In this paper, we present an effective secure key management scheme (SKeMS) which seeks an encryption key assignment such that the induced network is securely key connected and well protected against potential malicious eavesdropping attacks. Compared to previous work, our scheme assigns the available encryption keys among all the nodes in the network. Our simulation results show that our scheme outperforms previous schemes through providing a network that is resistant to malicious eavesdropping attack. © 2012 ACADEMY PUBLISHER.
引用
收藏
页码:596 / 605
相关论文
共 50 条
  • [31] A Novel Location Management Scheme for Wireless Mesh Networks
    Hu, Weiqi
    Zou, Shihong
    Cheng, Shiduan
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01) : 69 - 70
  • [32] Distributed Group Key Management in Wireless Mesh Networks
    Xiao, Peng
    He, Jingsha
    Fu, Yingfang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 115 - 120
  • [33] A key management scheme using deployment knowledge for wireless sensor networks
    Yu, Zhen
    Guan, Yong
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, 19 (10) : 1411 - 1425
  • [34] A key management scheme for wireless sensor networks using deployment knowledge
    Du, WL
    Deng, J
    Han, YS
    Chen, SG
    Varshney, PK
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 586 - 597
  • [35] A secure group key management scheme for wireless cellular systems
    Um, Hwayoung
    Delp, Edward J.
    International Journal of Network Security, 2008, 6 (01) : 40 - 52
  • [36] A Secure Hierarchical Key Management Scheme in Wireless Sensor Network
    Zhang, Yiying
    Li, Xiangzhen
    Liu, Jianming
    Yang, Jucheng
    Cui, Baojiang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [37] A new secure key management scheme for wireless sensor network
    Msolli, Amina
    Ameur, Haythem
    Helali, Abdelhamid
    Maaref, Hassen
    2017 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND DIAGNOSIS (ICCAD), 2017, : 254 - 257
  • [38] Hybrid group key management scheme for secure wireless multicast
    Wang, Yiling
    Le, Phu Dung
    Srinivasan, Balasubramaniam
    6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 346 - +
  • [39] A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks
    Hur, Junbeom
    Yoon, Hyunsoo
    MOBILE NETWORKS & APPLICATIONS, 2010, 15 (05): : 680 - 692
  • [40] A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks
    Junbeom Hur
    Hyunsoo Yoon
    Mobile Networks and Applications, 2010, 15 : 680 - 692