TWO DISTRIBUTIVE KEY MANAGEMENT SCHEMES IN MOBILE AD HOC NETWORKS

被引:0
作者
Al-Shurman, Mohammad [2 ]
Yoo, Seong-Moo [3 ]
Kim, Bonam [1 ]
Park, Seungjin [4 ]
机构
[1] Chungbuk Natl Univ, Sch Elect & Comp Engn, Cheongju, South Korea
[2] Jordan Univ Sci & Technol, Dept Comp Engn, Irbid, Jordan
[3] Univ Alabama, Dept Elect & Comp Engn, Huntsville, AL 35899 USA
[4] Univ So Indiana, Dept Management Management Informat Syst & Comp S, Evansville, IN USA
关键词
cover-free family; distributed key pre-distribution; maximum-distance separable code; mobile ad hoc networks; symmetric key; threshold key management;
D O I
10.1080/10798587.2010.10643103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today's ever smaller computing systems are increasingly spreading in our ubiquitous environment. Being available ubiquitously in the devices and appliances that we use everyday and everywhere, these embedded computing systems are accessible to mobile users via hand-held devices connected over wireless networks. A mobile ad hoc network (MANET) is one of the important wireless networks. In a MANET a reliable key management system is required to generate and distribute symmetric encryption/decryption keys. The key management schemes proposed in MANETs so far have used trusted third parties (TTP) which have limitations because of the mobility of nodes. A Distributed Key Pre-distribution Scheme was proposed based on a probabilistic method without relying on any TTP but with results identical to TTP-based schemes. The scheme utilized cover-free family (CFF) properties. However, the precondition of the probabilistic method was claimed to be falsely deduced. In this paper, we propose two distributive key management schemes using maximum distance separable codes (MDS). First, we will construct a practical (n, t + 1)-threshold key management system. Second, we propose a key pre-distribution scheme achieving CFF properties. We use a global MDS code instead of the probabilistic method to generate node keys. The scheme is secure enough against malicious nodes' fraud and tapping. The effects of block size and network parameters are also studied.
引用
收藏
页码:593 / 605
页数:13
相关论文
共 22 条
  • [1] BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
  • [2] CHAN ACF, 2004, IEEE INFOCOM 2004 HO
  • [3] CHAN H, 2003, IEEE S PRIV SEC
  • [4] DeCleene B., 2001, IEEE MILCOM
  • [5] Domingo-Ferrer J, 2002, LECT NOTES COMPUT SC, V2433, P471
  • [6] ESCHENAUER L, 2002, ACM CCS 02
  • [7] Griffin S.P., 2002, Hierarchical Key Management for Mobile Multicast Members
  • [8] Jeffrey Alan., 2001, Advanced engineering mathematics
  • [9] Kim SH, 2003, FOOD SCI BIOTECHNOL, V12, P79
  • [10] KIM Y, 2001, IFIP SEC 01