Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
In MANETs communication is done using a shared wireless channel. There is no provision for monitoring authority. The nodes in the network need to take the responsibility for both data transfer and also security. For robust security in MANETs, key management scheme is essential. However, secure key management is a challenging problem to be addressed. In this paper, we focused on a hybrid technique that makes use of identity and trust which enables to identify malicious nodes and also convert malicious node into a trusted node. Our hash technique is evaluated with NS2 simulations. The results reveal that the proposed system is able to identify malicious nodes in MANET and handle malicious nodes in such a way that they become trusted nodes.
International Journal of Distributed and Parallel systems, 2012
Mobile Ad-hoc network is spontaneous and infrastructure less network, which consist of wireless mobile nodes. MANET is formed on-the-fly and also provides various operations like packet forwarding, routing, network management, communication, etc between mobile nodes. MANET is one of the types of wireless network, in which any mobile node can join the network and leave the network in dynamic period. Mobile ad-hoc network doesn't having centralized infrastructure and due to its basic characteristics this network is very vulnerable to attack. There are lots of trust models and routing protocol which are used in MANETs to achieve security. Different trust schemes are used to provide confidentiality, integrity and availability in mobile ad-hoc network to gain the secure environment. In this paper, we present the study on various kinds of key management schemes with their special features.
International Journal of Innovative Research in Computer and Communication Engineering, 2015
Group key management is one of the basic building blocks in collaborative and group-oriented applications in Mobile Ad Hoc Networks (MANETs). Group key establishment involves creating and distributing a common secret for all group members. However, key management for a large and dynamic group is a difficult problem because of scalability and security. Dynamical changes in network’s topology causes feeble conviction relationship among the nodes in the network. In MANETs a mobile node operates as end terminal as well as an midway router. Therefore, a multi-hop situation occurs for communication in MANETs; where in between source and destination there may be one or more malicious nodes. In this paper, we proposed a key management scheme. We assume that MANETs is alienated into groups having a group leader in each group. Group leader has accountability of key management in its group. Proposed key management scheme is a decentralized method that does not need any Trusted Third Party (TTP...
IOSR Journal of Computer Engineering, 2014
InMobile ad hoc networks (MANETs) security has become a primary requirements.Thecharacteristics capabilities of MANETsexposeboth challenges and opportunities in achieving key security goals,such as confidentiality,access control,authentication, availability, integrity, and nonrepudiation.Cryptographic techniques are widely used for secure communications in both TCP and UDPnetworks. Most cryptographic mechanisms, such as symmetric and asymmetric cryptography,often involve the use of cryptographic keys. However, all cryptographic techniques will beunsecure or inefficient if the key management is weak. Key management is also a central component inMANET security. The main purpose of key management is to provide secure methods for handlingcryptographic keying algorithm. The tasks of key management includes keys for generation, distribution and maintenance. Key maintenance includes the procedures for key storage, keyupdate, key revocation, etc. In MANETs, the computational load and complexityfor key management are strongly subject to restriction by the node's available resources and thedynamic nature of network topology. A number of key management schemes have beenproposed for MANETs. In this article, we present a survey of the research work on keymanagement in MANETs according to recent publications.
IEEE Wireless Communications, 2000
MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination nodes directly or via the intermediate nodes. Nodes exchange packets with each other to allow the message to pass among both ends step by step. These packets are outside the wireless transmission range. It is for potential security concern because intermediate nodes cannot be trusted. With such feature ad-hoc networks are least attacked which influences performance of the network with its reliability. Secure communication in MANET is to be claimed by the reliability parameter of the key management strategy, which is capable for securing contents among the nodes. This survey presents the conceptual view for various key management techniques with their special features.
Information and …
Abstract__Key management has always been an issue in ad hoc networks. These networks are infrastructure-less which gives the attackers an open chance to intrude and operate it on their will. A lot of work has been done in the area but the techniques were either less secured or require too many computations and were based on asymmetric or symmetric key management cryptographic schemes. The employment of such schemes requires a trusted third party to provide the secret keys to all nodes in the ad hoc network before network formation, which can be taken as a serious flaw. The ideal form of the ad hoc networks functions in a self-organized manner. We have a proposed a hash chain based peer to peer key management and establishing the security association, which eliminates the need for third party key initializing in all the nodes and emphasize on self-organization.
Infrastructure less network is MANET which creates the temporary network. Performance and security are its two major issues. Due to its self organizing feature providing runtime network security is tedious task. MANET has been developed as a platform for controlling the applications. Privacy and authentication expands the key management for securing MANET. Due to its dynamic nature of efficient framework for securing the networks a symmetric key establishment is considered. Though MANET is efficient with dynamic infrastructures they are related to various security risks. In this paper, we have proposed Security key management (SKM) paradigm to provide authenticity over information for MANET. It shows Dispense Key method for generation and distribution of the keys. Then compared out framework Security key management (SKM) with our proposed algorithm and Advance Encryption Standard (AES), RSA, DES and shown the increased scalability of our framework. Keywords- SKM; Symmetric; Asymmetric, Manets, Key Generation
International Journal of Intelligent Engineering and Systems, 2018
Providing a reliable and secure communication in Mobile Adhoc Network (MANET) is a highly challenging and demanding task in recent days. For this purpose, different techniques are developed in the traditional works, but it lacks with the drawbacks of difficult key revocation, reduced security, increased delay, and bandwidth usage. To solve these problems, this paper motives to develop a routing technique, namely, Identity Based Key Management (IBKM) for providing a secure communication in MANET. Here, the group polynomial equation is generated at first for generating a unique ID to each node in the network. Then, the neighboring nodes of the source and destination are identified and registered in the network table. After that, the routing path between these nodes are validated in order to enable a reliable communication. The node pairing is performed and the public key is distributed to the nodes that are successfully paired. Sequentially, the signature of the packet is generated and verified, if both generated and received signature are same, the packet is received; otherwise, the misbehavior node is identified and blocked. To evaluate the results of the proposed mechanism, various performance measures such as malicious node detection probability, average message overhead, Packet Delivery Ratio (PDR), end-to-end delay, throughput, and routing overhead are used. Here, the results are evaluated with respect to various malicious node ratio, speed (m/s), and simulation time (s). Also, the existing Dynamic Source Routing (DSR) and Cooperative Bait Detection Scheme (CBDS) are compared with the proposed mechanism for proving the efficiency. From the results, it is analyzed that the PDR and throughput of the network is increased with the reduced message overhead and delay. Also, the proposed mechanism uses the identity based key management technique, which efficiently detects the malicious nodes in the network.
2013
Mobile ad hoc networks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Due to the nature of MANETs to design and maintaining security is challenging task for researcher in an open and distributed communication environment. This paper we proposed security architecture for MANET grid and optimal key management by combines symmetric key technique and elliptic curve public key technique. The proposed architecture and optimal key management eliminates threats including the man-in-the-middle attack and the Black hole attack can be effectively eliminated under the proposed scheme. The core advantages of the proposed scheme include strong security, scalability, fault-tolerance, accessibility, and efficiency.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.