CRYPTO '89 Proceedings on Advances in cryptology
Perfectly secure key distribution for dynamic conferences
Information and Computation
Optimizing the Scalability of Network Intrusion Detection Systems Using Mobile Agents
Journal of Network and Systems Management
Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Transmission Scheduling for Optimizing Sensor Network Lifetime: A Stochastic Shortest Path Approach
IEEE Transactions on Signal Processing
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Hi-index | 0.00 |
Hierarchical key management schemes would serve well for military applications where the organization of the network is already hierarchical in nature. Most of the existing key management schemes concentrate only on network structures and key allocation algorithms, ignoring attributes of the nodes themselves. Due to the distributed and dynamic nature of MANETs, it is possible to show that there is a security benefit to be attained when the node states are considered in the process of constructing a private key generator (PKG). In this paper, we propose a distributed hierarchical key management scheme in which nodes can get their keys updated either from their parent nodes or a threshold of sibling nodes. The proposed scheme can select the best nodes to be used as PGKs from all available ones considering their security conditions and energy states. Simulation results show that the proposed scheme can decrease network compromising probability and increase network lifetime.