Adaptive Group Key Management in Mobile Ad-hoc Networks (MANETs)

نویسنده

  • Inderpreet Kaur
چکیده

In recent years, Mobile Ad-hoc Networks have received an immense attention in both industry and academia as they provide dynamic networking services. Such networks are rapidly deployable in the future, so secure wireless environment will be obligatory. In mobile ad hoc networks, due to unreliable wireless media, lack of fixed infrastructure and host mobility, providing secure communications is a big challenge. Because a temporary device recurrently joins or leaves a network, the authentication and security technology should be equipped for the malicious devices used in thirdparty attacks. Usually, symmetric and asymmetric cryptographic techniques are used for secure communications in wired and wireless networks but they have their advantages and disadvantages. In fact, any cryptographic means is ineffective if its key management is fragile. Key management is one of the vital aspects for security in mobile ad hoc networks. In mobile ad hoc networks, the processing load and complexity for key management are strongly subject to restriction by the node’s available resources like energy and the dynamic nature of network topology. In this paper, Adaptive Group Key Management technique is proposed which uses symmetric key management. The proposed technique diagnoses compromised nodes in their regions by a secure key initially generated by the base stations (BSs). BSs carry out an initial key generation and trust is developed among mobile stations / nodes by another key known as group key. Simulations are done to observe the network performance and the results are very outstanding.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes

Mobile Ad-hoc networks (MANETs), providing infrastructure-free wireless instant communication, play important role in tactical military networks. However, providing security in tactical military MANETs, having very large and dynamic structure without infrastructure support in hostile environments, is a very difficult task. In order to address security problems in tactical military MANETs, we pr...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

Reliable Multicast in Heterogeneous Mobile Ad-hoc Networks

In disaster scenarios, communication infrastructure could be damaged or completely failed. Mobile Ad-hoc Networks (MANETs) can be used to substitute failed communication devices and thus to enable communication. As group communication is an important part in disaster scenarios, multicast will be used to address several nodes. In this paper, we propose our new reliable multicast protocol RMDA (R...

متن کامل

Energy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization

Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...

متن کامل

Energy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization

Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013