Communications of the ACM
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Certificate Chain Discovery in Web of Trust for Ad Hoc Networks
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 02
Stationary Distributions for the Random Waypoint Mobility Model
IEEE Transactions on Mobile Computing
Key distribution in mobile ad hoc networks based on message relaying
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Due to the inherent nature of Mobile Ad hoc Networks (MANETs), they are vulnerable to several types of attack such as passive and active attacks. In order to countermeasure the attack and to enable mobile nodes to communicate securely with each other, a key management process is always required. While central authorities perform the key management process in traditional wired networks, it is better to distribute the burden of key management process in MANET placed on a single authority among multiple nodes. In this paper, we propose a robust and redundant key management scheme for MANETs. In the proposed scheme, there are two approaches for key management. The first approach uses threshold cryptography to establish the distributed certificate authority among mobile nodes. The second approach is the key management through a web of trust. A mobile node can use one of the two approaches independently and can also use the two approaches together in order to obtain the authenticated public keys of other nodes in the network. The proposed scheme has been evaluated using the network simulator ns-2 and simulation results show the effectiveness of the proposed scheme.