Hybrid key management for mobile ad hoc networks

被引:0
|
作者
Sanchez, DS [1 ]
Baldus, H [1 ]
机构
[1] Philips Res Labs, Weisshausstr 2, Aachen, Germany
来源
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Many public key infrastructure (PKI) approaches have been proposed in the,recent years to secure mobile ad hoc networks (MANETs). We present a new hybrid key management infrastructure, which combines the concepts of PKIs for MANET with trusted-third-party based infrastructures. In our hybrid approach, the underlying PKI is merely used to set-up initial trust of nodes in a MANET, and, thus, generate a random trust graph connecting all the nodes of the MANET. Then, MANET nodes cooperate to securely distribute trust information and symmetric keys to other nodes through the shortest trust path. The hybrid key management infrastructure enables the same security services as a normal PKI yet key establishment and node-to-node authentication, as demonstrated by our performance analysis, is substantially improved in terms of computational and communication efficiency. We also discuss the security level of the hybrid approach.
引用
收藏
页码:337 / +
页数:2
相关论文
共 50 条
  • [1] Distributive key management for mobile ad hoc networks
    Al-Shurman, Mohammad
    Yoo, Seong-Moo
    Kim, Bonam
    MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 533 - +
  • [2] Robust key management for mobile ad hoc networks
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    不详
    Qinghua Daxue Xuebao, 2008, 7 (1194-1197):
  • [3] A framework for key management in mobile ad hoc networks
    Hadjichristofi, GC
    Adams, WJ
    Davis, NJ
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 568 - 573
  • [4] Distributed symmetric key management for mobile ad hoc networks
    Chan, ACF
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2414 - 2424
  • [5] A composite key management scheme for mobile ad hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 575 - 584
  • [6] Secure and efficient key management in mobile ad hoc networks
    Wu, Bing
    Wu, Jie
    Fernandez, Eduardo B.
    Ilyas, Mohammad
    Magliveras, Spyros
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 937 - 954
  • [7] Hierarchical key management for mobile ad-hoc networks
    Budakoglu, C
    Gulliver, TA
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2735 - 2738
  • [8] Security Assessment for Key Management in Mobile Ad Hoc Networks
    Abouhogail, Reham Abdellatif
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 169 - 182
  • [9] Key Management in Web of Trust for Mobile Ad Hoc Networks
    Dahshan, Hisham
    Irvine, James
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 363 - 370
  • [10] Research on Key Management Schemes for Mobile Ad Hoc Networks
    Han Lei
    Liu Ji-qiang
    Han Zhen
    Wei Xue-ye
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 225 - +