Filters








173,211 Hits in 4.0 sec

Mixed Key Management Using Hamming Distance for Mobile Ad-Hoc Networks [chapter]

Seok-Lae Lee, In-Kyung Jeun, Joo-Seok Song
2007 Lecture Notes in Computer Science  
This paper presents a method of authenticating the nodes in the ad-hoc network and securely transmitting information in consideration of the characteristics of the mobile ad hoc network.  ...  To this end, this paper proposes a method of combining asymmetric and symmetric cryptography to enhance the efficiency of secret key management for authentication and secure channel establishment.  ...  In general, the path construction algorithm is similar to routing algorithm in mobile ad-hoc network.  ... 
doi:10.1007/978-3-540-72586-2_96 fatcat:ceksrmdyqnalhiie6su5zqvf5a

Trust Establishment in Mobile Ad Hoc Networks: Key Management [chapter]

Dawoud D.S., Richard L., Ashraph Suliman, Kasmir Raja
2011 Mobile Ad-Hoc Networks: Applications  
Ad hoc networks remain an important part of current and future military communication.  ...  The first ad hoc networks were primarily deployed in the military domain in the early 1970's by the US Department of Defence, under the projects of DARPA and Packet Radio Network (PRnet) [Haas et al.,  ...  Trust Establishment in Mobile Ad Hoc Networks: Key Management Trust Establishment in Mobile Ad Hoc Networks: Key Management www.intechopen.com Mobile Ad-Hoc Networks: Applications Mobile Ad-Hoc  ... 
doi:10.5772/12866 fatcat:7kgddqyqazf25gndtrwwwwz5n4

A Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks

Atul Chaturvedi, Neelam Srivastava, Varun Shukla, S.P. Tripathi, Manoj Kumar
2015 International Journal of Computer Applications  
Authentication is necessary in wireless communication such as GSM or for Ad-Hoc purposes [26] .Here Latin word ad-hoc means for the specific purpose only.  ...  This paper provides an authenticated zero knowledge protocol which is very helpful in establishing secure wireless communication in ad-hoc networks by satisfying cryptographic goals such as authentication  ...  have been proposed for Ad-hoc networks [1, 5, 7, 9, 10, 16] .  ... 
doi:10.5120/ijca2015906437 fatcat:6fdtnmqejnehtodqdfvgnfdjia

A Pair-Wise Key Establishment Scheme for AD HOC Networks

Isra Sitan Al-Qasrawi, Obaida Mohammed Al-Hazaimeh
2013 International Journal of Computer Networks & Communications  
Ad hoc networks are a new wireless networking.  ...  In this paper, we have proposed a new scheme that will allow two ad hoc nodes to establish a pair-wise shared key on the fly (dynamic) during any stage of the network operations based on cellular automata  ...  These schemes do not allow for ad hoc network establishment.  ... 
doi:10.5121/ijcnc.2013.5210 fatcat:mjoqtskwn5hv3gqkpbrtyrlese

MESSAGE AUTHENTICATION CODE BASED SECURE GROUP KEY MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS

Labbai
2013 Journal of Computer Science  
A mobile ad hoc network is a group of nodes which are communicating with each other with the use of radio frequencies.  ...  For providing security, there are pre-requirements like key establishment, key agreement and key management and so on.  ...  Key Generation for Secure VBOR The absence of a centralized control in wireless ad hoc networks makes key management difficult.  ... 
doi:10.3844/jcssp.2013.1274.1282 fatcat:dajyjjb5wnadbjiutamsi2ykeq

Ad hoc key management infrastructure

B. Lehane, L. Dolye, D. O'Mahony
2005 International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II  
Key Management Infrastructure in an ad hoc network needs to be formed in an ad hoc manner.  ...  This paper introduces a novel multipurpose ad hoc Key Management Infrastructure (KMI) that can be used to provide Symmetric Key Infrastructure (SKI) or Public Key Infrastructure (PKI).  ...  An SKI is a novel solution for key management in an ad hoc networking environment.  ... 
doi:10.1109/itcc.2005.57 dblp:conf/itcc/LehaneDO05 fatcat:c5kefjynazf5djwaih5upheoda

Study on the Wireless Ad Hoc Network Secure Routing Based on the SAR Technology

Peng Li
2011 Computer and Information Science  
In this article, the SAR (Security-Aware Routing) technology is applied in the AODV (Ad Hoc On-demand Distance Vector) routing protocol, the AODV is modified as viewed from security performances, the wireless  ...  Ad Hoc routing protocol with secure consciousness could be realized, and the secure routing protocol (SAR-AODV) is simulated in the OMNet++ simulation environment based on the platform of Windows 2003  ...  In the Ad Hoc network, it is very danger to use single CA to establish the secret key management service, because single CA would be the key which is easy to be attacked in the network.  ... 
doi:10.5539/cis.v4n3p151 fatcat:kgmpy5o4ebb2dlczgpcopuqw7m

Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient [chapter]

Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng
2003 Lecture Notes in Computer Science  
Broadcast communication is an important operation for many application in mobile ad hoc networks.  ...  Several group key management protocols have been proposed. However, not all of them are communication efficient when applied to mobile ad hoc networks.  ...  After the key establishment, the nodes in the mobile ad hoc network moves around in the network.  ... 
doi:10.1007/978-3-540-45203-4_27 fatcat:ydg4umur25ewdkhorlunrb7ukq

Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments [chapter]

Sooyeon Shin, Taekyoung Kwon
2005 Lecture Notes in Computer Science  
In this paper, we study a simple scheme that can effectively deal with merging different adjacent clusters in ad-hoc networks.  ...  In general, two ways can be considered for this; 1) to agree on a new group key, and 2) to reuse the established group key which is used before merging.  ...  Conclusion In this paper, we have provided the group key agreement protocol for merging clusters in ad-hoc networks by not generating new group key but using the established key.  ... 
doi:10.1007/11596042_102 fatcat:aa4flkmwjzbmrh2o3qohxj66ei

Security Mandated Analytics based Route Processing with Digital Signature [SMARPDS] - Pseudonymous Mobile Ad Hoc Routing Protocol

K. Vinayakan, M. V. Srinath
2018 Indonesian Journal of Electrical Engineering and Computer Science  
It is an anonymous and authentication providing routing protocol in Mobile Ad hoc network.  ...  Ad hoc routing protocols must have provision for both anonymity providing nature and restriction of information collection from unauthorized nodes.  ...  Mobile ad hoc networks is known for its property of making each node act as a "router" to forward the traffic to other specified node in the network.  ... 
doi:10.11591/ijeecs.v10.i2.pp763-769 fatcat:blpva6yc2jfndgtzlpwjlyw4qy

Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs)

Inderpreet Kaur, A. L N. Rao
2013 International Journal of Computer Applications  
In fact, any cryptographic means is ineffective if its key management is fragile. Key management is one of the vital aspects for security in mobile ad hoc networks.  ...  In mobile ad hoc networks, the processing load and complexity for key management are strongly subject to restriction by the node's available resources like energy and the dynamic nature of network topology  ...  The ad-hoc network nodes provides mutual authentication and then establishes a session to help communication between devices.  ... 
doi:10.5120/12007-7293 fatcat:vlb7vylzdfdetc6l2hiu4lqite

Review of MANETS Using Distributed Public-key Cryptography [article]

Ms. Rajni, Ms. Reena
2014 arXiv   pre-print
Securing Mobile Ad-hoc Networks using Distributed Public-key Cryptography in pairing with Mobile Ad hoc Networks and various protocols are essential for secure communications in open and distributed environment  ...  The study of secure distributed key agreement has great theoretical and practical significance.  ...  This paper surveys the state of the art within key management for ad hoc networks, and examines their applicability for network-layer security.  ... 
arXiv:1405.0100v1 fatcat:3hs7cub5cbcethxs4kaukzcmyq

A practical approach of ID-based cryptosystem in ad hoc networks

Heeyoul Kim, Jumin Song, Hyunsoo Yoon
2007 Wireless Communications and Mobile Computing  
As research in ad hoc networking has advanced in knowledge for the last years, security for ad hoc networks becomes more and more important.  ...  As research in ad hoc networking has advanced, the importance of security increases more and more. But it suffers from the restriction that ad hoc networks do not have the established infrastructure.  ...  First of all, an ad hoc network does not have the established infrastructure.  ... 
doi:10.1002/wcm.500 fatcat:2jrvigqmqbbypeyoqjmdqjm3mq

Security Enhanced Adaptive TCP for Wireless Ad Hoc Networks

Waleed S. Alnumay
2014 Journal of Information Security  
In this paper, a security enhanced and adaptive TCP, namely SA-TCP, has been proposed for wireless ad hoc networks.  ...  In order to make SA-TCP suitable in highly vulnerable wireless ad hoc networks, a less complex identity-based public key cryptography has been integrated with the proposed protocol.  ...  The above key distribution is necessary for authentication of nodes in the ad hoc network to nullify the attacks.  ... 
doi:10.4236/jis.2014.54019 fatcat:qxchkrkuhzbrvciyfhhajz5v6u

Secure routing for mobile ad hoc networks

P.G. Argyroudis, D. O'Mahony
2005 IEEE Communications Surveys and Tutorials  
In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks.  ...  The assumption of a trusted environment is not one that can be realistically expected; hence, several efforts have been made toward the design of a secure and robust routing protocol for ad hoc networks  ...  ACKNOWLEDGMENTS The authors would like to thank Martin Reisslein and the anonymous reviewers for their constructive comments.  ... 
doi:10.1109/comst.2005.1610547 fatcat:tm3klt5asnatfhze2ipqyuptxq
« Previous Showing results 1 — 15 out of 173,211 results