Multi-level and group-based key management for mobile ad hoc networks

Hsiao Ching Lin, Ming Kung Sun, Hui-Tang Lin, Wen Chung Kuo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Mobile ad hoc networks have unique features, such as variable topology and lack of centralized management, therefore key management faces additional difficulty for deployed in this environment. In this paper, a (n, t, n) secret sharing method is applied towards a group-based mobile ad hoc networks architecture to provide authentication and key management services. All nodes participate in key pair generation as shareholders using a threshold secret sharing scheme. This group-based network consists of multi-level participants. The nodes in different levels have different identities. The node identity in a higher-level subset is different from the larger common group. In the subset, shared information is broadcast efficiently and securely without risk of eavesdropping from larger group.

Original languageEnglish
Title of host publicationProceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012
Pages164-167
Number of pages4
DOIs
Publication statusPublished - 2012 Dec 1
Event3rd International Conference on Information Security and Intelligent Control, ISIC 2012 - Yunlin, Taiwan
Duration: 2012 Aug 142012 Aug 16

Publication series

NameProceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012

Other

Other3rd International Conference on Information Security and Intelligent Control, ISIC 2012
CountryTaiwan
CityYunlin
Period12-08-1412-08-16

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Information Systems

Cite this

Lin, H. C., Sun, M. K., Lin, H-T., & Kuo, W. C. (2012). Multi-level and group-based key management for mobile ad hoc networks. In Proceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012 (pp. 164-167). [6449732] (Proceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012). https://doi.org/10.1109/ISIC.2012.6449732