Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2014, IOSR Journal of Computer Engineering
InMobile ad hoc networks (MANETs) security has become a primary requirements.Thecharacteristics capabilities of MANETsexposeboth challenges and opportunities in achieving key security goals,such as confidentiality,access control,authentication, availability, integrity, and nonrepudiation.Cryptographic techniques are widely used for secure communications in both TCP and UDPnetworks. Most cryptographic mechanisms, such as symmetric and asymmetric cryptography,often involve the use of cryptographic keys. However, all cryptographic techniques will beunsecure or inefficient if the key management is weak. Key management is also a central component inMANET security. The main purpose of key management is to provide secure methods for handlingcryptographic keying algorithm. The tasks of key management includes keys for generation, distribution and maintenance. Key maintenance includes the procedures for key storage, keyupdate, key revocation, etc. In MANETs, the computational load and complexityfor key management are strongly subject to restriction by the node's available resources and thedynamic nature of network topology. A number of key management schemes have beenproposed for MANETs. In this article, we present a survey of the research work on keymanagement in MANETs according to recent publications.
MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination nodes directly or via the intermediate nodes. Nodes exchange packets with each other to allow the message to pass among both ends step by step. These packets are outside the wireless transmission range. It is for potential security concern because intermediate nodes cannot be trusted. With such feature ad-hoc networks are least attacked which influences performance of the network with its reliability. Secure communication in MANET is to be claimed by the reliability parameter of the key management strategy, which is capable for securing contents among the nodes. This survey presents the conceptual view for various key management techniques with their special features.
International Journal of Innovative Research in Computer and Communication Engineering, 2015
Group key management is one of the basic building blocks in collaborative and group-oriented applications in Mobile Ad Hoc Networks (MANETs). Group key establishment involves creating and distributing a common secret for all group members. However, key management for a large and dynamic group is a difficult problem because of scalability and security. Dynamical changes in network’s topology causes feeble conviction relationship among the nodes in the network. In MANETs a mobile node operates as end terminal as well as an midway router. Therefore, a multi-hop situation occurs for communication in MANETs; where in between source and destination there may be one or more malicious nodes. In this paper, we proposed a key management scheme. We assume that MANETs is alienated into groups having a group leader in each group. Group leader has accountability of key management in its group. Proposed key management scheme is a decentralized method that does not need any Trusted Third Party (TTP...
International Journal of Distributed and Parallel systems, 2012
Mobile Ad-hoc network is spontaneous and infrastructure less network, which consist of wireless mobile nodes. MANET is formed on-the-fly and also provides various operations like packet forwarding, routing, network management, communication, etc between mobile nodes. MANET is one of the types of wireless network, in which any mobile node can join the network and leave the network in dynamic period. Mobile ad-hoc network doesn't having centralized infrastructure and due to its basic characteristics this network is very vulnerable to attack. There are lots of trust models and routing protocol which are used in MANETs to achieve security. Different trust schemes are used to provide confidentiality, integrity and availability in mobile ad-hoc network to gain the secure environment. In this paper, we present the study on various kinds of key management schemes with their special features.
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that is self-organized to form an arbitrary topology with the absence of fixed infrastructure or centralized administration .In such environment security has become a main concern to provide confidentiality, authentication, integrity, availability, access control, and non-repudiation. Key management is the main component in MANET security.This paper proposes an efficient and secure distributed group key management scheme. Where, nodes in the network are divided into clusters. Each cluster has a cluster head (CH) and cluster members. Cluster head is responsible for maintaining the group key. It also updates the group key whenever a member joins or leaves the cluster. There-keying process takes place within the cluster only. So the computation and communication cost will be reduced. Another level of security is considered between communicating parties belonging to different clusters.
Security has become a primary concern in mobile ad hoc networks (MANETs). The characteristics of MANETs pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. Cryptographic techniques are widely used for secure communications in wired and wireless networks. Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key management is weak. Key management is also a central component in MANET security. The purpose of key management is to provide secure procedures for handling cryptographic keying materials. The tasks of key management include key generation, key distribution, and key maintenance. Key maintenance includes the procedures for key storage, key update, key revocation, key archiving, etc. In MANETs, the computational load and complexity for key management are strongly subject to restriction by the node's available resources and the dynamic nature of network topology. A number of key management schemes have been proposed for MANETs. In this article, we present a survey of the research work on key management in MANETs according to recent literature.
The growing applications of Mobile Ad hoc Network (MANET) has made the security issue increasingly more important. B. Zhu et al. proposes a key management scheme using Shamir's secret sharing scheme to construct an Autonomous Key Management (AKM)hierarchy structure. However, Shamir's secret sharing in AKM to control key hierarchy needs larger message transmission costs. In this paper, we modify the secret sharing scheme and apply it to AKM for reducing communication and computation cost.
reconfigurable group key managementin MANETs. The proposed approach describes aboutthe simple and efficient group key (SERGK) managementfor region based MANETs. Group key establishment refersthat multiple parties want to create a shared secret to beused to exchange information securely. Without depending ona central trusted entity, two people who do notpreviouslyshareamutualsecretcancreateonebasedontheDHprotocol. The 2-party Diffie-Hellman (DH) protocol canbe prolonged to a generalized version of n-party DH.Research efforts have been put into the design of a groupkeymanagement scheme for the sake of scalability,reliability,and security. Furthermore, group key managementalso needs to address the security issue related tomembershipchanges. The modification of membershiprequires nourishmentofthegroupkey.Thiscanbedoneeitherbyperiodicrekeyingorupdatingrightaftermemberchange.Thechangeofgrou pkeyensuresbackwardandforward security.
IEEE Wireless Communications, 2000
International Journal of Security and Its Applications, 2014
A mobile ad hoc network (MANET) is a kind of wireless communication system that doesn't have base stations or routers. The wireless connections can be a standard Wi-Fi connection or satellite, or another medium such as a cellular transmission. Specific applications like military or public emergency require secure group communication in ad hoc environments. Good Key management is very important to get protection in any communication system. This paper presents most problems of securing key management in ad hoc networks. It presents a survey of different types of key management protocols in wired networks and in ad hoc networks. It presents the most common kinds of attacks in ad hoc networks. A new efficient approach is proposed. It is based on dividing the members into clusters. This scheme assumes a maximum allowed number of members in each cluster. This reduces the required number of encryption and decryption operations for each join operation in the cluster. This is most suitable for Mobile Ad hoc Networks.
2013
Abstract- Mobile ad hoc networks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Due to the nature of MANETs to design and maintaining security is challenging task for researcher in an open and distributed communication environment. This paper we proposed security architecture for MANET grid and optimal key management by combines symmetric key technique and elliptic curve public key technique. The proposed architecture and optimal key management eliminates threats including the man-in-the-middle attack and the Black hole attack can be effectively eliminated under the proposed scheme. The core advantages of the proposed scheme include strong security, scalability, fault-tolerance, accessibility, and efficiency.
International Journal of Engineering & Technology
Mobile ad-hoc networks (MANETS) are infrastructure less networks and the topology of this network is always changing. The nodes can enter and leave the network at any time. These networks require a high security in communication, as its application demands so. Effective key management is the only technique, which can implement to secure the nodes in communication. In adhocnetworks there is no central controller or router such as in wired network. This will make this network more vulnerable to attack. The intruders can easily enter the net-work and can manipulate the contents easily. Traditional key management schemes will not fit for this type of networks. This article, discuss various key management schemes based on routing protocols in mobile ad-hoc network (MANET). It also analyses them in terms of the security and applicability.
Infrastructure less network is MANET which creates the temporary network. Performance and security are its two major issues. Due to its self organizing feature providing runtime network security is tedious task. MANET has been developed as a platform for controlling the applications. Privacy and authentication expands the key management for securing MANET. Due to its dynamic nature of efficient framework for securing the networks a symmetric key establishment is considered. Though MANET is efficient with dynamic infrastructures they are related to various security risks. In this paper, we have proposed Security key management (SKM) paradigm to provide authenticity over information for MANET. It shows Dispense Key method for generation and distribution of the keys. Then compared out framework Security key management (SKM) with our proposed algorithm and Advance Encryption Standard (AES), RSA, DES and shown the increased scalability of our framework. Keywords- SKM; Symmetric; Asymmetric, Manets, Key Generation
Journal of Network and Computer Applications, 2007
In mobile ad hoc networks, due to unreliable wireless media, host mobility and lack of infrastructure, providing secure communications is a big challenge in this unique network en-vironment. Usually cryptography techniques are used for secure communications in wired and wireless networks. The asymmetric cryptography is widely used
2013
Mobile ad hoc networks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Due to the nature of MANETs to design and maintaining security is challenging task for researcher in an open and distributed communication environment. This paper we proposed security architecture for MANET grid and optimal key management by combines symmetric key technique and elliptic curve public key technique. The proposed architecture and optimal key management eliminates threats including the man-in-the-middle attack and the Black hole attack can be effectively eliminated under the proposed scheme. The core advantages of the proposed scheme include strong security, scalability, fault-tolerance, accessibility, and efficiency.
Materials Today: Proceedings, 2020
In the recent networking era, Mobile Adhoc Network has been popular as it effectively solves the limitations that were pertaining with single path routers. Multi-path mobile adhoc networks (MANETs) have various advantages which include high throughput, lower time complexity and high energy efficiency. The major challenges here are the key management and secured way of routing. Secure routing ensures data integrity, confidentiality, authorization and authentication and non-repudiation. These requirements are satisfied only by cryptographic algorithms. Key management is the most essential one in cryptography. The management of keys which is integrated with the protocol start with trusted and network with more authentication. In order to ensure the secured broadcasting in MANET, here we proposed a secured multipath routing mechanism for reliable data transmission using cryptographic algorithms. In our proposed method, we are hybridizing the popular Diffie-Hellman method of key exchange and elliptic curve cryptography (HDHECC). First, the nodes are subjected to clustering using the LEACH protocol and the cluster head selection process will be carried out with the help of weight of each node. Here the trust mechanism will be done by using the AOMDV. For the management of keys, every head of the cluster is made to retain its public key of the corresponding member nodes and are made to act only as a router. The proposed technique solves the overhead of the centralized management of keys. Moreover, the requirement to store all the public keys. The propose method is tested for its performance by evaluating the end-end delay, Packet delivery ratio and packet losses. The implementation is carried out using the NS2 simulator.
Computer Networks, 2005
Existing research efforts in key management can only handle very limited number of nodes and are vulnerable to active attacks. In addition, the flexibility and adaptivity of handling dynamic risks in different parts of networks, although critical in the practical usages of ad hoc networks, have been largely ignored. In this paper, we propose a novel hierarchical scheme based on threshold cryptography to address both security and efficiency issues of key management and certification service in Mobile Ad hoc Network (MANET). The main contributions of our key management scheme include: 1. providing various parts of MANET the flexibility of selecting appropriate security configurations, according to the risks faced; 2. providing the adaptivity to cope with rapidly-changing environments; 3. handling of MANETs with a large number of nodes; 4. issuing certificates with different levels of assurance. We also propose two algorithms, which can be used independently from the hierarchical structure, to protect certification services in ad hoc networks from active attacks. Our simulation results show that, compared to the previous work , our second algorithm is much faster in a friendly environment. When the key length is 1024 bits, the process of generating or renewing a certificate in our second algorithm is around six to eight times faster, and the process of generating partial certificates in our second algorithm is around 20-80 times faster. The latter advantage is critical in MANET where intrinsically the less help a node requests from its neighbors, the higher is the chance of obtaining the help. Furthermore, Computer Networks 48 simulation results also show that our two algorithms work well in a hostile environment in which existing schemes work poorly.
In MANETs communication is done using a shared wireless channel. There is no provision for monitoring authority. The nodes in the network need to take the responsibility for both data transfer and also security. For robust security in MANETs, key management scheme is essential. However, secure key management is a challenging problem to be addressed. In this paper, we focused on a hybrid technique that makes use of identity and trust which enables to identify malicious nodes and also convert malicious node into a trusted node. Our hash technique is evaluated with NS2 simulations. The results reveal that the proposed system is able to identify malicious nodes in MANET and handle malicious nodes in such a way that they become trusted nodes.
International Journal of Security Technology for Smart Device, 2019
Remote Network incorporates a bigger favorable position in the present correspondence application like ecological, movement, military and wellbeing perception. To understand these applications it's important to have a solid directing convention. The self-sorting out nature of MANETs makes them appropriate for some applications and henceforth, extensive exertion has been put into anchoring this kind of systems. Secure correspondence in a system is dictated by the unwavering quality of the key administration conspire, which is in charge of creating, circulating and looking after encryption/decoding keys among the hubs. In this paper different key administration plans for MANETs are talked about. This examination work proposes a novel secure Identity-Based Key Management convention making utilization of cryptographic and Information Theoretic Security.
Journal of emerging technologies and innovative research, 2014
Cryptography is one of basis of security solutions for mobile ad hoc networks. Among public key techniques, the identity-based ones are very attractive for mobile environment, mainly due to their simple key management process and reduced memory storage cost. In this paper we give an overview about existing Identity Based Key Management Schemes for MANET. We point out some problems of Identity-based key management schemes in MANETs, which are not addressed and we will explore in the future.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.