Filters








20,111 Hits in 7.6 sec

Cluster Based Composite Key Management in Mobile Ad Hoc Networks

R. PushpaLakshmi, Dr.A.Vincent Antony Kumar
2010 International Journal of Computer Applications  
Mobile ad hoc network is a wireless network without the support of network infrastructure. Security is one of the main challenge in ad hoc network due to dynamic topology and mobility of nodes.  ...  In this paper, we present a new composite key management scheme based on a combination of techniques such as hierarchical clustering, partially distributed key management, offline certification authority  ...  CONCLUSION In this paper, we presented a composite key management scheme for mobile ad hoc network.  ... 
doi:10.5120/836-1026 fatcat:33zytl55bjecrhjijmjcytfkbq

Approaches in Key Management Schemes in Mobile Ad-Hoc Networks: A Review

Nisha Sharma, Dr.Sugandha Singh
2016 IOSR Journal of Computer Engineering  
MANET (Mobile Ad hoc Network) is a convenient infrastructure-less contact web that is often susceptible to assorted assaults.  ...  Countless critical management schemes for MANETs are given to fix assorted protection problems.  ...  Mobile Ad Hoc Networks (MANETS) are wireless mobile nodes that cooperatively form a network without infrastructure. In other words, ad hoc networking allows devices to create a network on demand.  ... 
doi:10.9790/0661-1804021014 fatcat:rjb25nuj5fee5a5fuzhdxew3ca

A Review on Key Management Schemes in MANET

Renu Dalal
2012 International Journal of Distributed and Parallel systems  
Mobile Ad-hoc network is spontaneous and infrastructure less network, which consist of wireless mobile nodes.  ...  In this paper, we present the study on various kinds of key management schemes with their special features.  ...  When the mobile ad-hoc network is constructed, this scheme is using the concept of CA distribution in threshold fashion.  ... 
doi:10.5121/ijdps.2012.3417 fatcat:colxxtcrn5a65cqowlc6vs7fca

Key Management Schemes in MANET: A Review

Taranpreet Kaur
2018 International Journal for Research in Applied Science and Engineering Technology  
ad hoc networks.  ...  are used to provide confidentiality, integrity and availability in mobile ad-hoc network to gain the secure environment .This paper, present the study on various kinds of key management schemes with their  ...  Composite Key Management Recently, Yi, and Kravets provided a composite key management scheme in their paper "Composite key management for ad hoc networks".  ... 
doi:10.22214/ijraset.2018.1258 fatcat:t3pgxe7eibb73e5ha5in7wh4wa

Quantitative Modeling of Trust and Trust Management Protocols in Next Generation Social Networks Based Wireless Mobile Ad Hoc Networks

Yogesh Malhotra
2014 Social Science Research Network  
and self-adaptive mobile ad hoc networks.  ...  Science research program on wireless mobile ad hoc networks is the focus of our case study.  ...  Various trust management schemes have been developed for mobile ad hoc networks.  ... 
doi:10.2139/ssrn.2539180 fatcat:dzdb37dshfcvvofw6k2gatlb4i

Design of a Machine Learning-Based Intelligent Middleware Platform for a Heterogeneous Private Edge Cloud System

Sayed-Chhattan Shah
2021 Sensors  
Recent advances in mobile technologies have facilitated the development of a new class of smart city and fifth-generation (5G) network applications.  ...  A novel intelligent middleware platform is proposed in the current study to manage and utilize heterogeneous private edge cloud infrastructure efficiently.  ...  The heterogeneous private edge cloud sy project "mobile ad hoc cloud" [4] , in which multiple through a mobile ad hoc network are combined to create a The key differences between a mobile ad hoc cloud  ... 
doi:10.3390/s21227701 pmid:34833792 pmcid:PMC8618563 fatcat:2q77j7njyzbdvdfxmpn45fvzca

Routing protocol based key management schemes in manet: a survey

Shibu K.R, Suji Pramila R
2018 International Journal of Engineering & Technology  
Traditional key management schemes will not fit for this type of networks. This article, discuss various key management schemes based on routing protocols in mobile ad-hoc network (MANET).  ...  Mobile ad-hoc networks (MANETS) are infrastructure less networks and the topology of this network is always changing. The nodes can enter and leave the network at any time.  ...  In order to achieve security in mobile ad-hoc networks different key management schemes are there. The evaluation of this key management is based on different parameters.  ... 
doi:10.14419/ijet.v7i3.14219 fatcat:733exqdllrc6fpyvdf4worojhm

A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load [chapter]

Hoang Nam Nguyen, Hiroaki Morino
2005 Lecture Notes in Computer Science  
In this paper, we introduce a novel key management scheme for MANET, which exploits advantages of threshold cryptography.  ...  However, as mobile ad hoc networks (MANET) inherit unique characteristics such as dynamic topology, non-infrastructure architecture, centralized PKI architectures are not suitable for dynamic MANET.  ...  Public-Key Management Architecture The system model of managed open mobile ad hoc networks is shown in Fig. 1 where distributed authority entities are deployed.  ... 
doi:10.1007/11596042_93 fatcat:xqxuvp6riffple3jpvcvtn46mu

A Secure Key Management Model for Wireless Mesh Networks

Li Gao, Elizabeth Chang, Sazia Parvin, Song Han, Tharam Dillon
2010 2010 24th IEEE International Conference on Advanced Information Networking and Applications  
A low-computational and scalable key management model for WMNs is proposed in this paper which aims to guarantee well-performed key management services and protection from potential attacks.  ...  Keywords-Wireless Mesh Networks; security; key management I.  ...  Mu and Liu proposed a mesh based multicast key management scheme for mobile ad hoc networks [13] .  ... 
doi:10.1109/aina.2010.110 dblp:conf/aina/GaoCPHD10 fatcat:if5vl6nzbrfhzmldpqujz6rhya

Secure and Efficient Key Management Scheme in MANETs

Abu Taha Zamani, Syed Zubair
2014 IOSR Journal of Computer Engineering  
Keywords: Mobile ad hoc networks, Key management, , Security, PKI, MOCA Fundamentals of Key Management Cryptographic algorithms are security primitives that are widely used for the purposes ofauthentication  ...  InMobile ad hoc networks (MANETs) security has become a primary requirements.Thecharacteristics capabilities of MANETsexposeboth challenges and opportunities in achieving key security goals,such as confidentiality  ...  management for mobile ad hoc networks".  ... 
doi:10.9790/0661-16211146158 fatcat:4agogp7fb5hdnhustiyzcoejk4

An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks

V. S. Janani, M. S. K. Manikandan
2018 International Journal of Network Security  
Most of the researches in Mobile Ad Hoc Networks (MANETs) are closely related to security aspects and security issues.  ...  There are many security protocols as well as key management methods designed in a Public Key Infrastructure (PKI) to handle these MANET issues.  ...  Figure 1 shows typical cluster architecture in a mobile ad hoc network.  ... 
dblp:journals/ijnsec/JananiM18 fatcat:jv3dkxnqirb5bkbwgtc7ey2itq

A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

Ayman EL-SAYED
2014 International Journal of Advanced Computer Science and Applications  
Keywords-Group Key management; Mobile Ad hoc network; MANET security; Unicast/Multicast protocols in MANET. 208| P a g e www.ijacsa.thesai.org  ...  In this paper, we propose a new group key management schemes namely a Hierarchical, Simple, Efficient and Scalable Group Key (HSESGK) based on clustering management scheme for MANETs and different other  ...  Scheme [45] . 3) Group Key Management Scheme: Group key in cryptography is a single key which is assigned only for one group of mobile nodes in MANET.  ... 
doi:10.14569/ijacsa.2014.050430 fatcat:lljwl356pjftvn3wrv65cnxcny

A survey on peer-to-peer key management for mobile ad hoc networks

Johann Van Der Merwe, Dawoud Dawoud, Stephen McDonald
2007 ACM Computing Surveys  
The article reviews the most popular peer-to-peer key management protocols for mobile ad hoc networks (MANETs).  ...  -peer key management, pairwise key management ACM Reference Format: van der Merwe, J., Dawoud, D., and McDonald, S. 2007. A survey on peer-to-peer key management for mobile ad hoc networks.  ...  ACKNOWLEDGMENTS The authors would like to thank the anonymous reviewers for their insightful comments and suggestions.  ... 
doi:10.1145/1216370.1216371 fatcat:rcauxrgg7vgurhyibno5cqms6m

Table of content

2009 2009 IEEE International Conference on Pervasive Computing and Communications  
Ad Hoc Networks Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks Reliable Ranging Technique based on Statistical RSSI Analyses for an Ad-Hoc Proximity Detection System 121.  ...  Based Software Infrastructure for Ubiquitous Computing P2P over MANET: Indirect Tree-based Routing BitHoc: A content sharing application for Wireless Ad hoc Networks DiaSim: A Parameterized Simulator for  ... 
doi:10.1109/percom.2009.4912745 fatcat:fhuymlscefcqzge6hrv75diqou

The Role of Ad Hoc Networks in Mobile Telecommunication [chapter]

Qurratul-Ain Minhas, Hasan Mahmood, Hafiz Malik
2011 Recent Developments in Mobile Communications - A Multidisciplinary Approach  
Power management is a cross layer issue in ad hoc networks.  ...  Bluetooth scheme is also implemented for use as short range ad hoc networks.  ... 
doi:10.5772/26152 fatcat:uhofzkfegrhvbgo7wtez67d5zu
« Previous Showing results 1 — 15 out of 20,111 results