TY - GEN
T1 - Clustering-organized key management for mobile ad hoc networks
AU - Lin, Hua Yi
AU - Huang, Yueh Min
PY - 2004
Y1 - 2004
N2 - In contrast with traditional networks, with the characteristics of mobile wireless devices that can dynamically form a network without any infrastructure and wired line, mobile ad hoc networks usually do not provide on-line access to trusted authorities or to centralized servers. Furthermore, they frequently exhibit partition that is due to link and node failures and node mobility. For these reasons, if we apply traditional PKI Public Key Infrastructure) security architecture to mobile ad hoc networks, it will appear secure blind sides especially in large-scale ad hoc networks. For this point of view, we propose a new scalable cluster-organized key management scheme and distribution of trust to an aggregation of nodes by taking advantage of threshold cryptosystems faculty to perform key management. Furthermore, our approach provides robust CA (Certificate Authority) fault tolerance mechanism to keep off single failure point CA, improves the key exchange performance and security, and enhances the secure routing.
AB - In contrast with traditional networks, with the characteristics of mobile wireless devices that can dynamically form a network without any infrastructure and wired line, mobile ad hoc networks usually do not provide on-line access to trusted authorities or to centralized servers. Furthermore, they frequently exhibit partition that is due to link and node failures and node mobility. For these reasons, if we apply traditional PKI Public Key Infrastructure) security architecture to mobile ad hoc networks, it will appear secure blind sides especially in large-scale ad hoc networks. For this point of view, we propose a new scalable cluster-organized key management scheme and distribution of trust to an aggregation of nodes by taking advantage of threshold cryptosystems faculty to perform key management. Furthermore, our approach provides robust CA (Certificate Authority) fault tolerance mechanism to keep off single failure point CA, improves the key exchange performance and security, and enhances the secure routing.
UR - http://www.scopus.com/inward/record.url?scp=11144326202&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=11144326202&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:11144326202
SN - 088986411X
SN - 9780889864115
T3 - Proceedings of the Fourth IASTED International Multi-Conference on Wireless and Optical Communications
SP - 472
EP - 477
BT - Proceedings of the Fourth IASTED International Multi-Conference on Wireless and Optical Communications
A2 - Fapojuwo, A.O.
T2 - Proceedings of the Fourth IASTED International Multi-Conference on Wireless and Optical Communications
Y2 - 8 July 2004 through 10 July 2004
ER -