The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secret key establishment and freshness are challenging task in resource constrained wireless sensor networks (WSNs). A large number of messages are exchanged for key establishment at startup and every time a node join or leave the group to refresh keys. These operations incur huge computation and communication cost that reduces the network life time. To minimize energy consumption and improve network...
Key management for wireless sensor networks has been a challenging research topic since stringent resource constraints make the key pre-distribution schemes difficult to implement. This paper proposes a novel key pre-distribution method based on trivariate symmetry polynomial and hash function. First, the base station assigns some random numbers to each node using BIBD, then two nodes calculate the...
Ad hoc networks represent a very modern technology for providing communication between devices without the need of any prior infrastructure set up, and thus in an “on the spot” manner. But there is a catch: so far there isn't any security scheme that would suit the ad hoc properties of this type of networks and that would also accomplish the needed security objectives. The most promising proposals...
Key establishment has been a challenging problem in wireless sensor networks. With the increasing of the sensor network applications, many key predistribution schemes are proposed. In most key predistribution schemes, sensors are loaded with preassigned keys. Sensor nodes discover common keys to establish secure connection with neighboring nodes. Nodes that are not directly connected use intermediate...
In this paper, we present a new composite key management technique for key management in ad hoc network. The technique includes hierarchical clustering, partially distributed key management, offline certification authority and mobile agent. We apply the concept of dominating set based clustering for partitioning network into clusters. The cluster head is elected based on the trust ability of the node...
As Wireless Mesh Networks (WMNs) are newly emerging wireless technologies, they are designed to have huge potential for strengthening Internet deployment and access. However, they are far from mature for large-scale deployment in some applications due to the lack of the satisfactory guarantees on security. The main challenges exposed to the security of WMNs come from the facts of the shared nature...
Group key management scheme for mobile ad-hoc network is a research hotspot. A group key management architecture for a heterogeneous MANET model with UAV-aid and its detailed re-key methods are offered in this paper. At last, the performance analysis result of the architecture is also offered. The overload values of key storage and re-key computing show our scheme suits for heterogeneous mobile ad-hoc...
Wireless sensor networks are widely used in a variety of commercial and military applications. As a fundamental requirement for providing security functionality in sensor networks, key management plays an essential role in authentication and encryption. In this paper, we propose a Refined Key Link Tree (RKLT) scheme that incorporates dirty key path into the key link tree-based group key management...
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth and defection of centra authority. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques...
Secure and efficient communication among a set of mobile node is one of the most important research subjects in ad hoc wireless networks. Due to the resource scarcity in ad hoc networks, traditional key management protocol cannot be effectively applied to such decentralized networks. After study different strategies, in this paper the trust evaluation based clustering technique is employed to propose...
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present the key management scheme as a combination of identity-based and threshold cryptography for ad hoc networks. It is a certificateless solution which eliminates the need for public key distribution and certificates in conventional public key management schemes. With the lower cost of computation...
Most lightweight ad-hoc routing authentication protocols based on hash-chain method face the latency issue. This is because the late disclosure of predecessor key in the hash-chain leads to delayed authentication. Moreover, routing authentication approaches usually ignore or assume a prior key management as a working condition. In this paper, we integrate a reliable key management scheme based on...
Secure and efficient key management in ad hoc networks is a challenging task for the researches due to the special properties of ad hoc networks. Based on a self-organized key management protocol TIDS, this paper presents a new key management approach using Id-based multi-signcryption and threshold cryptography. To illuminate our approach concretely, a client??s private key update protocol in ad hoc...
Wireless sensor networks (WSN) are emerging technologies that enable various applications including tracking, monitoring and control. Because of ad-hoc, wireless communication and limitation of resources, much vulnerability arises. In false report injection attacks, an attacker tries to confuse a user or deplete energy resource of sensor nodes by injecting false reports through compromised nodes....
Mobile ad hoc network (MANET) is suitable for providing a communication platform for resource sharing or instant messaging to people in public places where no communication infrastructure exists. Like many other applications of MANET, the application over the communication platform has non-trivial security requirements due to the unique features of MANET (e.g. the open nature of wireless links and...
Security in mobile ad hoc networks (MANETs) is an active research topic. Bulks of prior work focused on key management and secure routing without addressing an important pre-requisite: network access control, the problem of admission and revocation of ad hoc nodes. In this paper, we present ID-NAC, identity-based network access control for MANETs. In ID-NAC each node in the network maintains a profile...
Efficient key management is an indispensable element for supporting security in ad hoc networks. However, several key pre-distribution approaches based on a trusted third party have limitations caused by their centralized principles. Distributed key selection mechanisms are offered to deal with the limitations of the centralized counterparts in ad hoc networks. In this study, we consider distributed...
The problem of key management in ad hoc networks was analyzed in this paper. Key management, however, can reveal information about the dynamics of ad hoc network membership, such as the group size and the number of joining and leaving users. Thus, only legitimate members have access to the messages. Once any member in the ad hoc network was going to join or leave the group, the group key would be...
Due to the insecure nature of the wireless media, the dynamically changing topology and lack of infrastructure, security in mobile ad hoc networks is hard to achieve. In this paper we present an analysis of a message-relaying based key distribution scheme for mobile ad hoc networks that was previously proposed by van der Merwe et al. Considering the message overhead occurring at the MAC layer in addition...
Personal network federation (PN-F) aims to provide secure interactions between a subset of devices of different personal networks (PN) for achieving a common goal or providing some services in collaborative environments. Security and privacy is one of the major concerns in the development and acceptance of PN-F like collaborative networks and as any other security architecture, the key management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.