Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A course in computational algebraic number theory
A course in computational algebraic number theory
Subquadratic-time factoring of polynomials over finite fields
Mathematics of Computation
Elliptic curves in cryptography
Elliptic curves in cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
Security Mechanisms for Using Mobile Agents in Electronic Commerce
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Access Control in Ad Hoc Groups
HOT-P2P '04 Proceedings of the 2004 International Workshop on Hot Topics in Peer-to-Peer Systems
Wireless Communications & Mobile Computing
A hierarchical key management scheme for secure group communications in mobile ad hoc networks
Journal of Systems and Software
Probabilistic algorithms in finite fields
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
Efficient migration for mobile computing in distributed networks
Computer Standards & Interfaces
Protocol interoperability in mobile IP enabled mobile ad hoc networks
Computer Standards & Interfaces
A key management protocol with robust continuity for sensor networks
Computer Standards & Interfaces
A root-based strategy for constructing a clustered MANET in all-IP networks
Computer Standards & Interfaces
Efficient migration access control for mobile agents
Computer Standards & Interfaces
Analysis of Handover Key Management schemes under IETF perspective
Computer Standards & Interfaces
New directions in cryptography
IEEE Transactions on Information Theory
IEEE Communications Magazine
A Survey of Routing Protocols that Support QoS in Mobile Ad Hoc Networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
A mobile ad hoc network (MANET) is a special type of wireless network in which a collection of mobile nodes with wireless network interfaces may form a temporary network, without the aids of any fixed infrastructure. Security has become a hot research topic in mobile ad hoc networks. In 1998, Volker and Mehrdad proposed a tree-based key management and access control scheme for the mobile agents to manage rights to access its own resources for the visited mobile nodes. Latter, Huang et al. showed that Volker and Mehrdad's scheme needs a large amount of storage and costs for managing and storing secret keys. Huang et al. further proposed a new and efficient scheme based on the elliptic curve cryptosystems to reduce costs and gain better efficiency. However, there is a security leak inherent in Huang et al.'s scheme that the malicious node can overstep his authority to access unauthorized information. This paper will propose a secure, robust, and efficient hierarchical key management scheme for MANETs. Some practical issues and solutions about dynamic key management are also considered and proposed. As compared with Huang et al.'s scheme, our proposed scheme can provide better security assurance, while requiring smaller key-size, lower computational complexities, and constant key management costs which is independent on the number of the confidential files and the visited nodes.