Loading…

Secure and efficient key management in mobile ad hoc networks

In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge in this unique network environment. Usually cryptography techniques are used for secure communications in wired and wireless networks. The asymmet...

Full description

Saved in:
Bibliographic Details
Main Authors: Wu, B., Wu, J., Fernandez, E.B., Magliveras, S.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue
container_start_page 8 pp.
container_title
container_volume
creator Wu, B.
Wu, J.
Fernandez, E.B.
Magliveras, S.
description In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge in this unique network environment. Usually cryptography techniques are used for secure communications in wired and wireless networks. The asymmetric cryptography is widely used because of its versatileness (authentication, integrity, and confidentiality) and simplicity for key distribution. However, this approach relies on a centralized framework of public key infrastructure (PKI). The symmetric approach has computation efficiency, yet it suffers from potential attacks on key agreement or key distribution. In fact, any cryptographic means is ineffective if the key management is weak. Key management is a central aspect for security in mobile ad hoc networks. In mobile ad hoc networks, the computational load and complexity for key management is strongly subject to restriction of the node's available resources and the dynamic nature of network topology. In this paper, we propose a secure and efficient key management framework (SEKM) for mobile ad hoc networks. SEKM builds PKI by applying a secret sharing scheme and an underlying multicast server group. In SEKM, the server group creates a view of the certification authority (CA) and provides certificate update service for all nodes, including the servers themselves. A ticket scheme is introduced for efficient certificate service. In addition, an efficient server group updating scheme is proposed.
doi_str_mv 10.1109/IPDPS.2005.393
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1420255</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1420255</ieee_id><sourcerecordid>1420255</sourcerecordid><originalsourceid>FETCH-LOGICAL-i1303-40a95f4d52e9d22d99115126a797f029215cc7e4a20a79bb0e577a3ace578b6d3</originalsourceid><addsrcrecordid>eNotjEFLw0AQRhdUsNZevXjZP5A6M5vJdg8epFotFCxUz2WzO9G1TSJJRfrvjejp8T0-nlJXCFNEcDfL9f16MyUAnhpnTtTE2RnYwjEZJD5VI2QDGYHlc3XR9x8ABCZ3I3W7kfDVifZN1FJVKSRpDnonR137xr9J_TtTo-u2TPvhFvV7G3Qjh--22_WX6qzy-14m_xyr18XDy_wpWz0_Lud3qyyhAZPl4B1XeWQSF4mic4iMVHjrbAXkCDkEK7knGFRZgrC13vgwcFYW0YzV9V83icj2s0u1745bzAmI2fwA1MlG0g</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Secure and efficient key management in mobile ad hoc networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Wu, B. ; Wu, J. ; Fernandez, E.B. ; Magliveras, S.</creator><creatorcontrib>Wu, B. ; Wu, J. ; Fernandez, E.B. ; Magliveras, S.</creatorcontrib><description>In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge in this unique network environment. Usually cryptography techniques are used for secure communications in wired and wireless networks. The asymmetric cryptography is widely used because of its versatileness (authentication, integrity, and confidentiality) and simplicity for key distribution. However, this approach relies on a centralized framework of public key infrastructure (PKI). The symmetric approach has computation efficiency, yet it suffers from potential attacks on key agreement or key distribution. In fact, any cryptographic means is ineffective if the key management is weak. Key management is a central aspect for security in mobile ad hoc networks. In mobile ad hoc networks, the computational load and complexity for key management is strongly subject to restriction of the node's available resources and the dynamic nature of network topology. In this paper, we propose a secure and efficient key management framework (SEKM) for mobile ad hoc networks. SEKM builds PKI by applying a secret sharing scheme and an underlying multicast server group. In SEKM, the server group creates a view of the certification authority (CA) and provides certificate update service for all nodes, including the servers themselves. A ticket scheme is introduced for efficient certificate service. In addition, an efficient server group updating scheme is proposed.</description><identifier>ISSN: 1530-2075</identifier><identifier>ISBN: 9780769523125</identifier><identifier>ISBN: 0769523129</identifier><identifier>DOI: 10.1109/IPDPS.2005.393</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Communication system security ; Computer network management ; Distributed computing ; Mobile ad hoc networks ; Mobile communication ; Network servers ; Public key ; Public key cryptography ; Wireless networks</subject><ispartof>19th IEEE International Parallel and Distributed Processing Symposium, 2005, p.8 pp.</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1420255$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54555,54920,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1420255$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wu, B.</creatorcontrib><creatorcontrib>Wu, J.</creatorcontrib><creatorcontrib>Fernandez, E.B.</creatorcontrib><creatorcontrib>Magliveras, S.</creatorcontrib><title>Secure and efficient key management in mobile ad hoc networks</title><title>19th IEEE International Parallel and Distributed Processing Symposium</title><addtitle>IPDPS</addtitle><description>In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge in this unique network environment. Usually cryptography techniques are used for secure communications in wired and wireless networks. The asymmetric cryptography is widely used because of its versatileness (authentication, integrity, and confidentiality) and simplicity for key distribution. However, this approach relies on a centralized framework of public key infrastructure (PKI). The symmetric approach has computation efficiency, yet it suffers from potential attacks on key agreement or key distribution. In fact, any cryptographic means is ineffective if the key management is weak. Key management is a central aspect for security in mobile ad hoc networks. In mobile ad hoc networks, the computational load and complexity for key management is strongly subject to restriction of the node's available resources and the dynamic nature of network topology. In this paper, we propose a secure and efficient key management framework (SEKM) for mobile ad hoc networks. SEKM builds PKI by applying a secret sharing scheme and an underlying multicast server group. In SEKM, the server group creates a view of the certification authority (CA) and provides certificate update service for all nodes, including the servers themselves. A ticket scheme is introduced for efficient certificate service. In addition, an efficient server group updating scheme is proposed.</description><subject>Authentication</subject><subject>Communication system security</subject><subject>Computer network management</subject><subject>Distributed computing</subject><subject>Mobile ad hoc networks</subject><subject>Mobile communication</subject><subject>Network servers</subject><subject>Public key</subject><subject>Public key cryptography</subject><subject>Wireless networks</subject><issn>1530-2075</issn><isbn>9780769523125</isbn><isbn>0769523129</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjEFLw0AQRhdUsNZevXjZP5A6M5vJdg8epFotFCxUz2WzO9G1TSJJRfrvjejp8T0-nlJXCFNEcDfL9f16MyUAnhpnTtTE2RnYwjEZJD5VI2QDGYHlc3XR9x8ABCZ3I3W7kfDVifZN1FJVKSRpDnonR137xr9J_TtTo-u2TPvhFvV7G3Qjh--22_WX6qzy-14m_xyr18XDy_wpWz0_Lud3qyyhAZPl4B1XeWQSF4mic4iMVHjrbAXkCDkEK7knGFRZgrC13vgwcFYW0YzV9V83icj2s0u1745bzAmI2fwA1MlG0g</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Wu, B.</creator><creator>Wu, J.</creator><creator>Fernandez, E.B.</creator><creator>Magliveras, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2005</creationdate><title>Secure and efficient key management in mobile ad hoc networks</title><author>Wu, B. ; Wu, J. ; Fernandez, E.B. ; Magliveras, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i1303-40a95f4d52e9d22d99115126a797f029215cc7e4a20a79bb0e577a3ace578b6d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Authentication</topic><topic>Communication system security</topic><topic>Computer network management</topic><topic>Distributed computing</topic><topic>Mobile ad hoc networks</topic><topic>Mobile communication</topic><topic>Network servers</topic><topic>Public key</topic><topic>Public key cryptography</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Wu, B.</creatorcontrib><creatorcontrib>Wu, J.</creatorcontrib><creatorcontrib>Fernandez, E.B.</creatorcontrib><creatorcontrib>Magliveras, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wu, B.</au><au>Wu, J.</au><au>Fernandez, E.B.</au><au>Magliveras, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Secure and efficient key management in mobile ad hoc networks</atitle><btitle>19th IEEE International Parallel and Distributed Processing Symposium</btitle><stitle>IPDPS</stitle><date>2005</date><risdate>2005</risdate><spage>8 pp.</spage><pages>8 pp.-</pages><issn>1530-2075</issn><isbn>9780769523125</isbn><isbn>0769523129</isbn><abstract>In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge in this unique network environment. Usually cryptography techniques are used for secure communications in wired and wireless networks. The asymmetric cryptography is widely used because of its versatileness (authentication, integrity, and confidentiality) and simplicity for key distribution. However, this approach relies on a centralized framework of public key infrastructure (PKI). The symmetric approach has computation efficiency, yet it suffers from potential attacks on key agreement or key distribution. In fact, any cryptographic means is ineffective if the key management is weak. Key management is a central aspect for security in mobile ad hoc networks. In mobile ad hoc networks, the computational load and complexity for key management is strongly subject to restriction of the node's available resources and the dynamic nature of network topology. In this paper, we propose a secure and efficient key management framework (SEKM) for mobile ad hoc networks. SEKM builds PKI by applying a secret sharing scheme and an underlying multicast server group. In SEKM, the server group creates a view of the certification authority (CA) and provides certificate update service for all nodes, including the servers themselves. A ticket scheme is introduced for efficient certificate service. In addition, an efficient server group updating scheme is proposed.</abstract><pub>IEEE</pub><doi>10.1109/IPDPS.2005.393</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1530-2075
ispartof 19th IEEE International Parallel and Distributed Processing Symposium, 2005, p.8 pp.
issn 1530-2075
language eng
recordid cdi_ieee_primary_1420255
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Authentication
Communication system security
Computer network management
Distributed computing
Mobile ad hoc networks
Mobile communication
Network servers
Public key
Public key cryptography
Wireless networks
title Secure and efficient key management in mobile ad hoc networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T17%3A11%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Secure%20and%20efficient%20key%20management%20in%20mobile%20ad%20hoc%20networks&rft.btitle=19th%20IEEE%20International%20Parallel%20and%20Distributed%20Processing%20Symposium&rft.au=Wu,%20B.&rft.date=2005&rft.spage=8%20pp.&rft.pages=8%20pp.-&rft.issn=1530-2075&rft.isbn=9780769523125&rft.isbn_list=0769523129&rft_id=info:doi/10.1109/IPDPS.2005.393&rft_dat=%3Cieee_6IE%3E1420255%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i1303-40a95f4d52e9d22d99115126a797f029215cc7e4a20a79bb0e577a3ace578b6d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1420255&rfr_iscdi=true