Loading…
Secure and efficient key management in mobile ad hoc networks
In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge in this unique network environment. Usually cryptography techniques are used for secure communications in wired and wireless networks. The asymmet...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | 8 pp. |
container_title | |
container_volume | |
creator | Wu, B. Wu, J. Fernandez, E.B. Magliveras, S. |
description | In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge in this unique network environment. Usually cryptography techniques are used for secure communications in wired and wireless networks. The asymmetric cryptography is widely used because of its versatileness (authentication, integrity, and confidentiality) and simplicity for key distribution. However, this approach relies on a centralized framework of public key infrastructure (PKI). The symmetric approach has computation efficiency, yet it suffers from potential attacks on key agreement or key distribution. In fact, any cryptographic means is ineffective if the key management is weak. Key management is a central aspect for security in mobile ad hoc networks. In mobile ad hoc networks, the computational load and complexity for key management is strongly subject to restriction of the node's available resources and the dynamic nature of network topology. In this paper, we propose a secure and efficient key management framework (SEKM) for mobile ad hoc networks. SEKM builds PKI by applying a secret sharing scheme and an underlying multicast server group. In SEKM, the server group creates a view of the certification authority (CA) and provides certificate update service for all nodes, including the servers themselves. A ticket scheme is introduced for efficient certificate service. In addition, an efficient server group updating scheme is proposed. |
doi_str_mv | 10.1109/IPDPS.2005.393 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1420255</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1420255</ieee_id><sourcerecordid>1420255</sourcerecordid><originalsourceid>FETCH-LOGICAL-i1303-40a95f4d52e9d22d99115126a797f029215cc7e4a20a79bb0e577a3ace578b6d3</originalsourceid><addsrcrecordid>eNotjEFLw0AQRhdUsNZevXjZP5A6M5vJdg8epFotFCxUz2WzO9G1TSJJRfrvjejp8T0-nlJXCFNEcDfL9f16MyUAnhpnTtTE2RnYwjEZJD5VI2QDGYHlc3XR9x8ABCZ3I3W7kfDVifZN1FJVKSRpDnonR137xr9J_TtTo-u2TPvhFvV7G3Qjh--22_WX6qzy-14m_xyr18XDy_wpWz0_Lud3qyyhAZPl4B1XeWQSF4mic4iMVHjrbAXkCDkEK7knGFRZgrC13vgwcFYW0YzV9V83icj2s0u1745bzAmI2fwA1MlG0g</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Secure and efficient key management in mobile ad hoc networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Wu, B. ; Wu, J. ; Fernandez, E.B. ; Magliveras, S.</creator><creatorcontrib>Wu, B. ; Wu, J. ; Fernandez, E.B. ; Magliveras, S.</creatorcontrib><description>In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge in this unique network environment. Usually cryptography techniques are used for secure communications in wired and wireless networks. The asymmetric cryptography is widely used because of its versatileness (authentication, integrity, and confidentiality) and simplicity for key distribution. However, this approach relies on a centralized framework of public key infrastructure (PKI). The symmetric approach has computation efficiency, yet it suffers from potential attacks on key agreement or key distribution. In fact, any cryptographic means is ineffective if the key management is weak. Key management is a central aspect for security in mobile ad hoc networks. In mobile ad hoc networks, the computational load and complexity for key management is strongly subject to restriction of the node's available resources and the dynamic nature of network topology. In this paper, we propose a secure and efficient key management framework (SEKM) for mobile ad hoc networks. SEKM builds PKI by applying a secret sharing scheme and an underlying multicast server group. In SEKM, the server group creates a view of the certification authority (CA) and provides certificate update service for all nodes, including the servers themselves. A ticket scheme is introduced for efficient certificate service. In addition, an efficient server group updating scheme is proposed.</description><identifier>ISSN: 1530-2075</identifier><identifier>ISBN: 9780769523125</identifier><identifier>ISBN: 0769523129</identifier><identifier>DOI: 10.1109/IPDPS.2005.393</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Communication system security ; Computer network management ; Distributed computing ; Mobile ad hoc networks ; Mobile communication ; Network servers ; Public key ; Public key cryptography ; Wireless networks</subject><ispartof>19th IEEE International Parallel and Distributed Processing Symposium, 2005, p.8 pp.</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1420255$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54555,54920,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1420255$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wu, B.</creatorcontrib><creatorcontrib>Wu, J.</creatorcontrib><creatorcontrib>Fernandez, E.B.</creatorcontrib><creatorcontrib>Magliveras, S.</creatorcontrib><title>Secure and efficient key management in mobile ad hoc networks</title><title>19th IEEE International Parallel and Distributed Processing Symposium</title><addtitle>IPDPS</addtitle><description>In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge in this unique network environment. Usually cryptography techniques are used for secure communications in wired and wireless networks. The asymmetric cryptography is widely used because of its versatileness (authentication, integrity, and confidentiality) and simplicity for key distribution. However, this approach relies on a centralized framework of public key infrastructure (PKI). The symmetric approach has computation efficiency, yet it suffers from potential attacks on key agreement or key distribution. In fact, any cryptographic means is ineffective if the key management is weak. Key management is a central aspect for security in mobile ad hoc networks. In mobile ad hoc networks, the computational load and complexity for key management is strongly subject to restriction of the node's available resources and the dynamic nature of network topology. In this paper, we propose a secure and efficient key management framework (SEKM) for mobile ad hoc networks. SEKM builds PKI by applying a secret sharing scheme and an underlying multicast server group. In SEKM, the server group creates a view of the certification authority (CA) and provides certificate update service for all nodes, including the servers themselves. A ticket scheme is introduced for efficient certificate service. In addition, an efficient server group updating scheme is proposed.</description><subject>Authentication</subject><subject>Communication system security</subject><subject>Computer network management</subject><subject>Distributed computing</subject><subject>Mobile ad hoc networks</subject><subject>Mobile communication</subject><subject>Network servers</subject><subject>Public key</subject><subject>Public key cryptography</subject><subject>Wireless networks</subject><issn>1530-2075</issn><isbn>9780769523125</isbn><isbn>0769523129</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjEFLw0AQRhdUsNZevXjZP5A6M5vJdg8epFotFCxUz2WzO9G1TSJJRfrvjejp8T0-nlJXCFNEcDfL9f16MyUAnhpnTtTE2RnYwjEZJD5VI2QDGYHlc3XR9x8ABCZ3I3W7kfDVifZN1FJVKSRpDnonR137xr9J_TtTo-u2TPvhFvV7G3Qjh--22_WX6qzy-14m_xyr18XDy_wpWz0_Lud3qyyhAZPl4B1XeWQSF4mic4iMVHjrbAXkCDkEK7knGFRZgrC13vgwcFYW0YzV9V83icj2s0u1745bzAmI2fwA1MlG0g</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Wu, B.</creator><creator>Wu, J.</creator><creator>Fernandez, E.B.</creator><creator>Magliveras, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2005</creationdate><title>Secure and efficient key management in mobile ad hoc networks</title><author>Wu, B. ; Wu, J. ; Fernandez, E.B. ; Magliveras, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i1303-40a95f4d52e9d22d99115126a797f029215cc7e4a20a79bb0e577a3ace578b6d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Authentication</topic><topic>Communication system security</topic><topic>Computer network management</topic><topic>Distributed computing</topic><topic>Mobile ad hoc networks</topic><topic>Mobile communication</topic><topic>Network servers</topic><topic>Public key</topic><topic>Public key cryptography</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Wu, B.</creatorcontrib><creatorcontrib>Wu, J.</creatorcontrib><creatorcontrib>Fernandez, E.B.</creatorcontrib><creatorcontrib>Magliveras, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wu, B.</au><au>Wu, J.</au><au>Fernandez, E.B.</au><au>Magliveras, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Secure and efficient key management in mobile ad hoc networks</atitle><btitle>19th IEEE International Parallel and Distributed Processing Symposium</btitle><stitle>IPDPS</stitle><date>2005</date><risdate>2005</risdate><spage>8 pp.</spage><pages>8 pp.-</pages><issn>1530-2075</issn><isbn>9780769523125</isbn><isbn>0769523129</isbn><abstract>In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge in this unique network environment. Usually cryptography techniques are used for secure communications in wired and wireless networks. The asymmetric cryptography is widely used because of its versatileness (authentication, integrity, and confidentiality) and simplicity for key distribution. However, this approach relies on a centralized framework of public key infrastructure (PKI). The symmetric approach has computation efficiency, yet it suffers from potential attacks on key agreement or key distribution. In fact, any cryptographic means is ineffective if the key management is weak. Key management is a central aspect for security in mobile ad hoc networks. In mobile ad hoc networks, the computational load and complexity for key management is strongly subject to restriction of the node's available resources and the dynamic nature of network topology. In this paper, we propose a secure and efficient key management framework (SEKM) for mobile ad hoc networks. SEKM builds PKI by applying a secret sharing scheme and an underlying multicast server group. In SEKM, the server group creates a view of the certification authority (CA) and provides certificate update service for all nodes, including the servers themselves. A ticket scheme is introduced for efficient certificate service. In addition, an efficient server group updating scheme is proposed.</abstract><pub>IEEE</pub><doi>10.1109/IPDPS.2005.393</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1530-2075 |
ispartof | 19th IEEE International Parallel and Distributed Processing Symposium, 2005, p.8 pp. |
issn | 1530-2075 |
language | eng |
recordid | cdi_ieee_primary_1420255 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Communication system security Computer network management Distributed computing Mobile ad hoc networks Mobile communication Network servers Public key Public key cryptography Wireless networks |
title | Secure and efficient key management in mobile ad hoc networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T17%3A11%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Secure%20and%20efficient%20key%20management%20in%20mobile%20ad%20hoc%20networks&rft.btitle=19th%20IEEE%20International%20Parallel%20and%20Distributed%20Processing%20Symposium&rft.au=Wu,%20B.&rft.date=2005&rft.spage=8%20pp.&rft.pages=8%20pp.-&rft.issn=1530-2075&rft.isbn=9780769523125&rft.isbn_list=0769523129&rft_id=info:doi/10.1109/IPDPS.2005.393&rft_dat=%3Cieee_6IE%3E1420255%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i1303-40a95f4d52e9d22d99115126a797f029215cc7e4a20a79bb0e577a3ace578b6d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1420255&rfr_iscdi=true |