A Key Management Solution for Secure Routing in Mobile Ad Hoc Networks

被引:0
作者
Ashraph, Sulaiman [1 ]
Dawoud, Dawoud S. [1 ]
Niyonkuru, Adronis [1 ]
机构
[1] Natl Univ Rwanda, Butare, Rwanda
来源
IMETI 2011: 4TH INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II | 2011年
关键词
Ad hoc networks; Trust chain; On-demand routing protocol; Secure Routing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper investigates the need for security and more specifically key management for secure routing in mobile ad hoc networks. A key management protocol is proposed for on-demand ad hoc routing protocols. The proposal provides key distribution and security evaluation to allow the most secure path to be selected during route discovery. Simulations modeled in ns-2 investigate the success of the key distribution mechanism and security scheme.
引用
收藏
页码:68 / 72
页数:5
相关论文
共 16 条
[1]  
[Anonymous], P 4 IEEE WORKSH MOB
[2]  
[Anonymous], NETW DISTR SYST SEC
[3]  
Awerbuch B, 2008, ACM T INFORM SYST SE, V10, DOI [10.1145/1284680.1284686, 10.1145/1284680.1341892]
[4]  
Basagni S., 2001, P 2 ACM INT S MOB HO
[5]  
Buchegger S, 2002, P 3 ACM INT S MOB HO
[6]   Mobility helps peer-to-peer security [J].
Capkun, S ;
Hubaux, JP ;
Buttyán, L .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (01) :43-51
[7]   Self-organized public-key management for mobile ad hoc networks [J].
Capkun, S ;
Buttyán, L ;
Hubaux, JP .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2003, 2 (01) :52-64
[8]   Ariadne: A secure on-demand routing protocol for ad hoc networks [J].
Hu, YC ;
Perrig, A ;
Johnson, DB .
WIRELESS NETWORKS, 2005, 11 (1-2) :21-38
[9]  
Mohri M., 2002, Journal of Automata, Languages and Combinatorics, V7, P321
[10]  
PAPADIMITRATOS P, 2003, P 2003 S APPL INT WO