Select Algorithm for Local Certificate Repository of Self-organized Key Management Scheme in Ad hoc Networks

被引:0
|
作者
Liu Shizhong [1 ]
Zhang Zongyun [2 ]
机构
[1] Weifang Vocat Coll, Dept Informat Engn, Weifang, Peoples R China
[2] Weifang Univ, Coll Comp & Commun Engn, Weifang, Peoples R China
来源
FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013) | 2013年 / 8878卷
关键词
Ad hoc net work; self-organized key management; certificate chain; select algorithm;
D O I
10.1117/12.2030643
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Based on the Maximum Degree Construction algorithm, a new select algorithm is proposed in this paper. In the algorithm, each node and its neighbors issue the certificates each other to generate the local In-degree and Out-degree certificate repository. Similar to the ant colony algorithm, it finds the certificate chain between the source node and destination node by selecting the node of the maximum certificated times from the beginning. The algorithm reduces the complexity of the selection, provides a guarantee to find the certificate chain, and saves the spending of space as well. Next, this paper gives the simulation of the algorithm and the simulated results show that this is an optimized select algorithm for local certificate repository.
引用
收藏
页数:5
相关论文
共 33 条
  • [21] Key management based on hierarchical secret sharing in ad-hoc networks
    Ma, Chuangui
    Cheng, Rui
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 182 - 191
  • [22] Threshold and Identity Based Group Key Management Protocols in Ad Hoc Networks
    Zhang, Jianmin
    Li, Jian
    ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 127 - 130
  • [23] TAKCS: Threshold authentication key configuration scheme for multilayer cluster in mobile ad hoc networks
    Lee, KH
    Hwang, CS
    8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U491 - U496
  • [24] Strategy and Simulation of Trust Cluster Based Key Management Protocol for Ad hoc Networks
    Xu, Li
    Wang, Xiaoding
    Shen, Jinbo
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 269 - 274
  • [25] Mixed key management using Hamming Distance for mobile ad-hoc networks
    Lee, Seok-Lae
    Jeun, In-Kyung
    Song, Joo-Seok
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 2, PROCEEDINGS, 2007, 4488 : 665 - +
  • [26] A hybrid routing algorithm based on local optimal clusters for ad-hoc networks
    Lei, W
    Lin, YP
    Yang, XL
    Raju, S
    PROCEEDINGS OF THE 7TH JOINT CONFERENCE ON INFORMATION SCIENCES, 2003, : 1345 - 1348
  • [27] Performance analysis of random database group scheme for mobility management in ad hoc networks
    Li, HD
    Haas, ZJ
    Liang, B
    2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 313 - 317
  • [28] A dynamic reconfiguration tolerant self-stabilizing token circulation algorithm in ad-hoc networks
    Kakugawa, H
    Yamashita, M
    PRINCIPLES OF DISTRIBUTED SYSTEMS, 2005, 3544 : 256 - 266
  • [29] A dynamic node degree management scheme for energy-efficient routing protocols in wireless ad hoc networks
    Huang, YC
    Chuang, SY
    Wang, SD
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS WORKSHOPS, VOL II, PROCEEDINGS,, 2005, : 7 - 11
  • [30] A multiple random walks based self-stabilizing k-exclusion algorithm in ad hoc networks
    Bernard, Thibault
    Bui, Alain
    Flauzac, Olivier
    Nolot, Florent
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2010, 25 (02) : 135 - 152