Key Distribution System for MANET with Minimum Prior Trust Relationship

نویسندگان

  • R. Murugan
  • A. Shanmugam
چکیده

As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. The present approach provides for a distributed key management and authentication approach by deploying the recently developed concepts of identitybased cryptography and threshold secret sharing. Without any assumption of pre-fixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management service, which effectively solves the problem of single point of failure in the traditional public key infrastructure (PKI)supported system. The identity-based cryptography mechanism provided not only to provide end-to-end authenticity and confidentiality, but also saves network bandwidth and computational power of wireless nodes. Index Terms Mobile ad hoc networks, security, authentication, Self-organized, Key Distribution, Identity

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Attribute Based Schema for Trust and Cluster Based Authentication Mechanism in MANET

A mobile adhoc network is wireless communication network that have been collection of nodes with no fixed infrastructure and are able to discover the nearby node with lack of centralized control .Due to this lack of security issues occurs, so protecting the data or node in the network is essential in MANET. In recent works distributed system are mostly depend on key distribution and management ...

متن کامل

Access Aware Routing Protocol (AARP) Towards Trust Management for Mobile Ad Hoc Networks

In this paper, Access Aware Routing Protocol (AARP) towards Trust Management problem for Mobile Ad hoc Network (MANET) is proposed. In MANET, nodes periodically move over the terrain space with transmission range. In this research work a scheme to handle trust establishment and aggregation issues are proposed. Unlike trust management in previous schemes, trust management in MANET involves neigh...

متن کامل

A Secure Dominating set based routing and key management scheme in Mobile Ad hoc Network

In Mobile Ad hoc Network (MANET) nodes communicate with each other using shared wireless medium. Due to their distributed nature and dynamic topology, MANET is less secured than wired network. To enhance the security of MANET, it is important to establish routing path based on the trustworthiness of each node in the network. Most existing routing protocols in MANET mainly focus at finding effic...

متن کامل

Selective Diffusion of Ratings in Trust Propagation for MANETs Topics: 1. Concepts, Theory and Policy 2. Networks and Networking

In mobile ad hoc networks (MANET), existing multicast protocols are regularly used by nodes to propagate information. The usual objective of these protocols is to efficiently deliver the information to a large number of subscribed nodes. However, in some circumstances, there may be a need to prevent some nodes from acquiring sensitive information during the broadcast. It becomes even more disru...

متن کامل

A robust self-organized public key management for mobile ad hoc networks

A mobile ad hoc network MANET is a self-organized wireless network where mobile nodes can communicate with each other without the use of any existing network infrastructure or centralized administration. Trust establishment and management are essential for any security framework of MANETs. However, traditional solutions to key management through accessing trusted authorities or centralized serv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009