New hybrid key management scheme for Ad hoc networks

被引:0
|
作者
Wang, Hao [1 ]
Xie, Ying [1 ]
Zheng, Wu [2 ]
机构
[1] College of Automation, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
[2] School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
来源
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China | 2007年 / 36卷 / 06期
关键词
Network security - Ad hoc networks;
D O I
暂无
中图分类号
学科分类号
摘要
Key management schemes based on threshold mechanism can provide high security, but lower certificate success rate and bad scalability; key management schemes based on certification chain satisfy self-organized features, but their security depends on trust degree of nodes and could not be applied high security environment. We advance hybrid key management scheme based on threshold mechanism and certification chain. Simulation shows that with less increment of communication overhead, our scheme can improve both certificate success rate and system security and better balances security and availability, and satisfies security needs of Ad hoc networks.
引用
收藏
页码:1164 / 1166
相关论文
共 50 条
  • [21] Secure and robust threshold key management (SRKM) scheme for ad hoc networks
    Hamouid, K.
    Adi, K.
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (06) : 517 - 534
  • [22] Robust Key Management Scheme for Certification in Mobile Ad-hoc Networks
    Hamouid, K.
    Adi, K.
    ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 354 - +
  • [23] A key management scheme combined with intrusion detection for mobile Ad Hoc networks
    Fu, Yingfang
    He, Jingsha
    Luan, Liangyu
    Li, Guorui
    Rong, Wang
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2008, 4953 : 584 - +
  • [24] Blockchain-Oriented Key Management Scheme for Aeronautical Ad Hoc Networks
    Zhou J.
    Liu H.
    Zhou Y.
    Lyu Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (01): : 63 - 68
  • [25] An Identity-based and Threshold Key Management Scheme for Ad hoc Networks
    Sun, Hua
    Zheng, Xuefeng
    Deng, Zhongjun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 520 - 523
  • [26] A secure group key management scheme for hierarchical mobile ad hoc networks
    Huang, Dijiang
    Medhi, Deep
    AD HOC NETWORKS, 2008, 6 (04) : 560 - 577
  • [27] A scalable key management and clustering scheme for wireless ad hoc and sensor networks
    Li, Jason H.
    Bhattacharjee, Bobby
    Yu, Miao
    Levy, Renato
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2008, 24 (08): : 860 - 869
  • [28] A group key establishment scheme for ad hoc networks
    Du, XJ
    Wang, Y
    Ge, JH
    Wang, YM
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 518 - 520
  • [29] A PUBLIC KEY MANAGEMENT SCHEME AND THRESHOLD-MULTISIGNATURE SCHEME FOR MOBILE AD HOC NETWORKS
    van der Merwe, J.
    Dawoud, D. S.
    McDonald, S.
    SAIEE AFRICA RESEARCH JOURNAL, 2006, 97 (01): : 82 - 92
  • [30] Key Management for Large Ad Hoc Networks
    Gao, Fengxiu
    Li, Guangsong
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,