Clustering-organized key management for mobile ad hoc networks

Hua Yi Lin, Yueh Min Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

In contrast with traditional networks, with the characteristics of mobile wireless devices that can dynamically form a network without any infrastructure and wired line, mobile ad hoc networks usually do not provide on-line access to trusted authorities or to centralized servers. Furthermore, they frequently exhibit partition that is due to link and node failures and node mobility. For these reasons, if we apply traditional PKI Public Key Infrastructure) security architecture to mobile ad hoc networks, it will appear secure blind sides especially in large-scale ad hoc networks. For this point of view, we propose a new scalable cluster-organized key management scheme and distribution of trust to an aggregation of nodes by taking advantage of threshold cryptosystems faculty to perform key management. Furthermore, our approach provides robust CA (Certificate Authority) fault tolerance mechanism to keep off single failure point CA, improves the key exchange performance and security, and enhances the secure routing.

Original languageEnglish
Title of host publicationProceedings of the Fourth IASTED International Multi-Conference on Wireless and Optical Communications
EditorsA.O. Fapojuwo
Pages472-477
Number of pages6
Publication statusPublished - 2004
EventProceedings of the Fourth IASTED International Multi-Conference on Wireless and Optical Communications - Banff, Canada
Duration: 2004 Jul 82004 Jul 10

Publication series

NameProceedings of the Fourth IASTED International Multi-Conference on Wireless and Optical Communications

Other

OtherProceedings of the Fourth IASTED International Multi-Conference on Wireless and Optical Communications
Country/TerritoryCanada
CityBanff
Period04-07-0804-07-10

All Science Journal Classification (ASJC) codes

  • General Engineering

Fingerprint

Dive into the research topics of 'Clustering-organized key management for mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this