Mitigating eavesdropping attack using secure key management scheme in wireless mesh networks

被引:5
|
作者
Kandah, Farah [1 ]
Singh, Yashaswi [1 ]
Zhang, Weiyi [2 ]
机构
[1] Department of Computer Science, North Dakota State University, Fargo, ND 58105, United States
[2] AT and T Labs - Research, Middletown, NJ 07748, United States
来源
Journal of Communications | 2012年 / 7卷 / SPL.ISS. 8期
关键词
Network security - Wireless mesh networks (WMN) - MESH networking - Public key cryptography - Security systems;
D O I
10.4304/jcm.7.8.596-605
中图分类号
学科分类号
摘要
Wireless mesh network (WMN) is a rapid deployed, self organized and multi-hop wireless networks. However, the wireless and distributed natures of WMN make it subject to various kinds of malicious attacks, which raise a great challenge in securing these networks. Most existing security mechanisms are based on cryptographic keys where a high degree key management services are in demand. In this paper, we present an effective secure key management scheme (SKeMS) which seeks an encryption key assignment such that the induced network is securely key connected and well protected against potential malicious eavesdropping attacks. Compared to previous work, our scheme assigns the available encryption keys among all the nodes in the network. Our simulation results show that our scheme outperforms previous schemes through providing a network that is resistant to malicious eavesdropping attack. © 2012 ACADEMY PUBLISHER.
引用
收藏
页码:596 / 605
相关论文
共 50 条
  • [21] An Efficient Authenticated Key Establishment Scheme for Wireless Mesh Networks
    He, Bing
    Joshi, Saugat
    Agrawal, Dharma P.
    Sun, Dongmei
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [22] An attack resistant key predistribution scheme for wireless sensor networks
    Ahlawat, Priyanka
    Dave, Mayank
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (03) : 268 - 280
  • [23] Key Management Scheme for Wireless Sensor Networks
    Wang, Yongjian
    Zhao, Jing
    WIRELESS INTERNET (WICON 2017), 2018, 230 : 272 - 283
  • [24] SLAB: A Secure Localized Authentication and Billing Scheme for Wireless Mesh Networks
    Zhu, Haojin
    Lin, Xiaodong
    Lu, Rongxing
    Ho, Pin-Han
    Shen, Xuemin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (10) : 3858 - 3868
  • [25] Research on Detection Scheme for Denial of Service Attack in Wireless Mesh Networks
    Fu, Yingfang
    Xiao, Peng
    Luang, Liangyu
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 181 - 184
  • [26] Secure localization scheme against wormhole attack for wireless sensor networks
    Chen, Hong-Long
    Wang, Zhi-Bo
    Wang, Zhi
    Xu, Jiang-Ming
    Li, Yan-Jun
    Liu, Li-Ping
    Tongxin Xuebao/Journal on Communications, 2015, 36 (03):
  • [27] An efficient key management scheme for secure sensor networks
    Du, RY
    Tu, HJ
    Wen, S
    PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 279 - 283
  • [28] A novel location management scheme for wireless mesh networks
    Hu, Weiqi
    Zou, Shihong
    Cheng, Shiduan
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 108 - 115
  • [29] A Cooperative Mobility Management Scheme for Wireless Mesh Networks
    Song, Jiaying
    Liu, Qiuyan
    Zhong, Zhangdui
    Li, Xu
    2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 672 - 676
  • [30] A secure group key management scheme for sensor networks
    Poornima, A. S.
    Amberker, B. B.
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 744 - +