On-demand public-key management for mobile ad hoc networks

被引:19
作者
Li, Ruidong
Li, Jie [1 ]
Liu, Peng
Chen, Hsiao-Hwa
机构
[1] Univ Tsukuba, Grad Sch Syst & Informat Engn, Tsukuba 3058573, Japan
[2] Penn State Univ, Sch Informat Sci & Technol, University Pk, PA 16802 USA
[3] Natl Sun Yat Sen Univ, Inst Commun Engn, Kaohsiung, Taiwan
关键词
mobile ad hoc networks; security; public key management;
D O I
10.1002/wcm.396
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mobile ad hoc network (MANET) is the cooperative engagement of a collection of wireless mobile nodes without the aid of any established infrastructure or centralized administration. The conventional security solutions to provide key management through accessing trusted authorities or centralized servers are infeasible for this new environment since mobile ad hoc networks are characterized by the absence of any infrastructure, frequent mobility, and wireless links. In this paper, we propose an on-demand, fully localized, and hop-by-hop public key management scheme for MANETs. It can be performed by generating public/private key pairs by nodes themselves, issuing certificates to neighboring nodes, holding these certificates in their certificate repositories, and providing authentication service adaptive quickly to the dynamic topology of the network without relying on any servers. Also, our scheme can be performed successfully as long as there is a physical communication line between two nodes, and it is accustomed well to the on-demand routing for MANETs. Copyright (c) 2006 John Wiley & Sons, Ltd.
引用
收藏
页码:295 / 306
页数:12
相关论文
共 50 条
  • [41] Experimental evaluation of an on-demand multipath routing protocol for video transmission in mobile ad hoc networks
    TANIYAMA Kenta
    MORII Takeshi
    KOIZUMI Shinya
    NOGUCHI Kazuhiro
    KOTANI Yukihiro
    KATTO Jiro
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2006, (S1) : 145 - 150
  • [42] Agent-based trusted on-demand routing protocol for mobile ad-hoc networks
    Abdel-Halim, Islam Tharwat
    Fahmy, Hossam Mahmoud Ahmed
    Bahaa-Eldin, Ayman Mohammad
    [J]. WIRELESS NETWORKS, 2015, 21 (02) : 467 - 483
  • [43] Design of a Buffer Enabled Ad hoc On-demand Multipath Distance Vector Routing Protocol for Improving Throughput in Mobile Ad hoc Networks
    Y. Harold Robinson
    S. Balaji
    E. Golden Julie
    [J]. Wireless Personal Communications, 2019, 106 : 2053 - 2078
  • [44] A Survey on Trust Management for Mobile Ad Hoc Networks
    Cho, Jin-Hee
    Swami, Ananthram
    Chen, Ing-Ray
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04): : 562 - 583
  • [45] Design of a Buffer Enabled Ad hoc On-demand Multipath Distance Vector Routing Protocol for Improving Throughput in Mobile Ad hoc Networks
    Robinson, Y. Harold
    Balaji, S.
    Julie, E. Golden
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (04) : 2053 - 2078
  • [46] Securing mobile ad hoc networks with certificateless public keys
    Zhang, Yanchao
    Liu, Wei
    Lou, Wenjing
    Fang, Yuguang
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (04) : 386 - 399
  • [47] A Secure Key Management System in Group Structured Mobile Ad hoc Networks
    Chauhan, Kamal Kumar
    Tapaswi, Shashikala
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 307 - 311
  • [48] A Predictive Clustering Technique for Effective Key Management in Mobile Ad Hoc Networks
    John, Saju P.
    Samuel, Philip
    [J]. INFORMATION SECURITY JOURNAL, 2011, 20 (4-5): : 250 - 260
  • [49] Identity-based and threshold key management in mobile ad hoc networks
    Li, Jingfeng
    Wei, Dawei
    Kou, Hongzhao
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 795 - 798
  • [50] A secure group key management scheme for hierarchical mobile ad hoc networks
    Huang, Dijiang
    Medhi, Deep
    [J]. AD HOC NETWORKS, 2008, 6 (04) : 560 - 577