Distributive key management for mobile ad hoc networks

被引:3
|
作者
Al-Shurman, Mohammad [1 ]
Yoo, Seong-Moo [2 ]
Kim, Bonam [3 ]
机构
[1] Jordan Univ Sci & Technol, CPE Dept, Amman, Jordan
[2] Univ Alabama Huntsville, ECE Dept, Huntsville, AL 35487 USA
[3] Chungbuk Natl Univ, Cheongju, South Korea
来源
MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS | 2008年
关键词
ad hoc networks; MDS code; mobile security; symmetric key; threshold cryptography;
D O I
10.1109/MUE.2008.66
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security of mobile ad hoc networks is built upon a reliable key management system to generate and distribute symmetric encryption/decryption keys for communicating parties. While central servers generate and distribute the keys in traditional wired networks, distributive key management systems are used in mobile ad hoc networks where central approaches will fail in such dynamic, high mobility networks. Threshold cryptography has been proposed to provide a reliable, distributive key management for networks. In an (n, t+1) threshold system, there are n servers to provide key generation and distribution when needed for the whole network. From these n servers, any x servers (t < x <= n) can co-operate and generate a key for any node. Until now, threshold cryptography has remained only a theory. No practical key management system has been proposed to use threshold cryptography that mentioned what kind of shares servers will have in common and the practical way of creating the key from these shares. In this paper, we will construct a practical (n, t+1)-threshold key management system using maximum distance separable codes (MDS).
引用
收藏
页码:533 / +
页数:2
相关论文
共 50 条
  • [1] TWO DISTRIBUTIVE KEY MANAGEMENT SCHEMES IN MOBILE AD HOC NETWORKS
    Al-Shurman, Mohammad
    Yoo, Seong-Moo
    Kim, Bonam
    Park, Seungjin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2010, 16 (04): : 593 - 605
  • [2] Hybrid key management for mobile ad hoc networks
    Sanchez, DS
    Baldus, H
    CHALLENGES IN AD HOC NETWORKING, 2006, 197 : 337 - +
  • [3] Robust key management for mobile ad hoc networks
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    不详
    Qinghua Daxue Xuebao, 2008, 7 (1194-1197):
  • [4] A framework for key management in mobile ad hoc networks
    Hadjichristofi, GC
    Adams, WJ
    Davis, NJ
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 568 - 573
  • [5] Distributed symmetric key management for mobile ad hoc networks
    Chan, ACF
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2414 - 2424
  • [6] A composite key management scheme for mobile ad hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 575 - 584
  • [7] Secure and efficient key management in mobile ad hoc networks
    Wu, Bing
    Wu, Jie
    Fernandez, Eduardo B.
    Ilyas, Mohammad
    Magliveras, Spyros
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 937 - 954
  • [8] Hierarchical key management for mobile ad-hoc networks
    Budakoglu, C
    Gulliver, TA
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 2735 - 2738
  • [9] Security Assessment for Key Management in Mobile Ad Hoc Networks
    Abouhogail, Reham Abdellatif
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 169 - 182
  • [10] Key Management in Web of Trust for Mobile Ad Hoc Networks
    Dahshan, Hisham
    Irvine, James
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 363 - 370