Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

Author(s):  
Woei-Jiunn Tsaur ◽  
Haw-Tyng Pai ◽  
Theodore E. Simos ◽  
George Psihoyios
Author(s):  
Sasan Adibi ◽  
Gordon B. Agnew

Mobile ad hoc networks (MANETs) have gained popularity in the past decade with the creation of a variety of ad hoc protocols that specifically offer quality of service (QoS) for various multimedia traffic between mobile stations (MSs) and base stations (BSs). The lack of proper end-to-end security coverage, on the other hand, is a challenging issue as the nature of such networks with no specific infrastructure is prone to relatively more attacks, in a variety of forms. The focus of this chapter is to discuss a number of attack scenarios and their remedies in MANETs including the introduction of two entities; ad hoc key distribution center (AKDC) and decentralize key generation and distribution (DKGD), which serve as key management schemes.


Author(s):  
Johann van der Merwe ◽  
Dawoud Dawoud

Group communication in mobile ad hoc networks (MANETs) generally occurs in the form of dynamic peer groups (DPGs). This chapter reviews the existing group key management schemes for DPGs, found in conventional networks, with respect to their suitability for MANETs. The schemes are uniquely categorized based on their underlying key establishment mechanisms and group topologies. Each group is introduced by presenting the most promising scheme belonging to the subset. The discussions reveal the strengths and weaknesses of the existing schemes and identify the challenges in designing group key management schemes compatible with the unique characteristics of generic MANETs.


2010 ◽  
Vol 16 (4) ◽  
pp. 593-605 ◽  
Author(s):  
Mohammad Al-Shurman ◽  
Seong-Moo Yoo ◽  
Bonam Kim ◽  
Seungjin Park

2011 ◽  
Vol 1 ◽  
pp. 295-299
Author(s):  
Jun Wu ◽  
Run Hua Shi ◽  
Hong Zhong

This paper proposes a hierarchical key management scheme in the mobile Ad hoc networks. In this scheme, there are two kinds of server nodes: the special server nodes and the ordinary server nodes, such that only when two kinds of server nodes collaborate can they provide a certificate service. In order to satisfy this special application, we design a new secret sharing scheme for splitting the system private key, in which it generates two different kinds of shares of the system private key: the special share and the ordinary share, where it needs at least one special share and t ordinary shares to recover the system private key, thus we call it threshold scheme. Furthermore, we present a distributed signature scheme for a user’s certificate in the mobile Ad hoc networks based on this secret sharing.


Sign in / Sign up

Export Citation Format

Share Document