Routing protocol based key management schemes in manet: a survey
-
2018-07-11 https://doi.org/10.14419/ijet.v7i3.14219 -
Manet, Key Management, CA, Certificate Chaining, -
Abstract
Mobile ad-hoc networks (MANETS) are infrastructure less networks and the topology of this network is always changing. The nodes can enter and leave the network at any time. These networks require a high security in communication, as its application demands so. Effective key management is the only technique, which can implement to secure the nodes in communication. In adhocnetworks there is no central controller or router such as in wired network. This will make this network more vulnerable to attack. The intruders can easily enter the net-work and can manipulate the contents easily. Traditional key management schemes will not fit for this type of networks. This article, discuss various key management schemes based on routing protocols in mobile ad-hoc network (MANET). It also analyses them in terms of the security and applicability.
Â
Â
-
References
[1] Diffie, Whitfield, and Martin Hellman. "New directions in cryptography." IEEE transactions on Information Theory 22, no. 6 (1976): 644-654.https://doi.org/10.1109/TIT.1976.1055638.
[2] Khalili-Shoja, Mohammad Reza, George TraianAmariucai, Shuangqing Wei, and Jing Deng. "Secret common randomness from routing metadata in ad hoc networks." IEEE Transactions on Information Forensics and Security 11, no. 8 (2016): 1674-1684https://doi.org/10.1109/TIFS.2016.2550424.
[3] Park, Stephen K., and Keith W. Miller. "Random number generators: good ones are hard to find." Communications of the ACM 31, no. 10 (1988): 1192-1201.https://doi.org/10.1145/63039.63042.
[4] Johnson, David B., David A. Maltz, and Josh Broch. "DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks." Ad hoc networking five (2001): 139-172.
[5] Shoja, Mohammad Reza Khalili, George TraianAmariucai, Shuangqing Wei, and Jing Deng. "KERMAN: A key establishment algorithm based on harvesting randomness in MANETs." arXiv preprint arXiv: 1504.03744 (2015).
[6] Eschenauer, Laurent, and Virgil D. Gligor. "A key-management scheme for distributed sensor networks." In Proceedings of the ninth ACM Conference on Computer and Communications Security, pp. 41-47. ACM, 2002.https://doi.org/10.1145/586110.586117.
[7] Capkun, Srdjan, LeventeButtyán, and J-P. Hubaux. "Self-organized public-key management for mobile ad hoc networks." IEEE Transactions on mobile computing two, no. 1 (2003): 52-64.
[8] Yi, Seung, and Robin Kravets. "Composite Key Management for Ad Hoc Networks." In MobiQuitous, vol. 4, pp. 52-61. 2004.
[9] Dahshan, Hisham, and James irvine. "A trust based threshold cryptography key management for mobile ad hoc networks." in vehicular technology conference fall (vtc 2009-fall), 2009 ieee 70th, pp. 1-5. ieee, 2009.
-
Downloads
-
How to Cite
K.R, S., & Pramila R, S. (2018). Routing protocol based key management schemes in manet: a survey. International Journal of Engineering & Technology, 7(3), 1453-1456. https://doi.org/10.14419/ijet.v7i3.14219Received date: 2018-06-17
Accepted date: 2018-06-29
Published date: 2018-07-11