Open Access Open Access  Restricted Access Subscription or Fee Access

A Dynamic and Distributed Key Management Scheme for MANETs


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v10i3.5451

Abstract


Mobile Adhoc Network (MANET) is a collection of autonomous nodes that communicate with each other by forming a single-hop or, multi-hop wireless network and by maintaining connectivity in a decentralized manner. The network topology is dynamic, because the connectivity among the nodes varies with itinerant, quitting and joining nodes. In comparison with fixed networks, some new security issues have arisen with the introduction of MANETs. In secure ad hoc network authorized nodes access the network based on network initialization, authentication and secure communication. Authentication forms the core in security, where nodes exchange data based on key management. Certificate Authority (CA) function as trust infrastructure and enable the nodes to access or leave the network. The main feature of security protocols is key management, which includes key distribution and key update. The design of key management mechanisms for Manets is a particularly complex issue, because the lack of an infrastructure, shared wireless medium, stringent resource constraints and highly dynamic topology. In this work, we propose an enhanced solution for ad hoc key management based on the performance, the trust and the density of nodes. This solution manage cryptographic keys in a dynamic and distributed way. This paper sheds light on the key management algorithm for the standard OLSR protocol. Our objective is to distribute the certification authority functions for a dynamic number of nodes that will serve for keys exchange. The selection of CA is based on the node’s performance, i.e, the node that has the minimum requirement to act as CA will play this role, the solution takes into account the node’s trust which represent the value of cooperation of nodes and the node density which represent the number of node’s neighbors Analysis and simulation results are used to show the performance of our solution compared with other solution in the literature.
Copyright © 2015 Praise Worthy Prize - All rights reserved.

Keywords


Ad Hoc; Key Management; Cryptography; PKI; OLSR

Full Text:

PDF


References


Rishikesh Teke et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7954-7957.

T. CLAUSEN ET P. JACQUET. Optimized Link State Routing Protocol (OLSR).http://www.ietf.org/rfc/rfc3626.txt, 2003, RFC 3626Shaveta Rani et al, / (IJCSIT) International.

Rishikesh Teke et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7954-7957.

M. Aziz and Al-Akaidi, “Security Issues in Wireless Ad hoc Networks and the Application to the Telecare project”, IEEE, 2007, pp. 491-494.
http://dx.doi.org/10.1109/icdsp.2007.4288626

Rashid Sheikh, Mahakal Singh Chandel, Durgesh k. Mishra,”Security Issues in MANET: a Review”, IEEE 2010,pp. 1-4.
http://dx.doi.org/10.1109/wocn.2010.5587317

Bing Wu, Jie Wu and Mihaela Cardei, Chapter xxx –“Survey of Key Management in Mobile Ad Hoc Naetworks”, Handbook of research on wireless security, pp.1-23.
http://dx.doi.org/10.4018/978-1-59904-899-4.ch030

Dawoud D.S, Richard L. Gordon, Ashraph Suliman and K Asmir Raja S.V., “Trust Establishment in Mobile Ad Hoc Networks: Key Management”, Chapter 8, available:www.intechopen.com, pp.151-192.
http://dx.doi.org/10.5772/12866

Guojun Wang, Q. Wang, J. Cao, M. Guo,”An Effective Trust Establishment for Authentication in Mobile Ad-Hoc Networks”, IEEE 7th International Conference on Computer and Information Technology, 2007,pp. 749-754.
http://dx.doi.org/10.1109/cit.2007.55

Kärpijoki Vesa, .Security in Ad Hoc Networks.,Telecommunications Software and Multimedia Laboratory 2002.

L. Zhou and Z. J. Haas, .Securing Ad Hoc Networks., IEEE Networks,Volume 13, Issue 6 1999.
http://dx.doi.org/10.1109/65.806983

H. Luo and S. Lu, .Ubiquitous and Robust Authentication Services forAd Hoc Wireless Networks., Technical Report 200030, UCLA Computer Science Department 2000.

J-P. Hubaux, L. Buttyán and S. Capkun, .The Quest for Security in Mobile Ad Hoc Networks.,ACM 2001.
http://dx.doi.org/10.1145/501416.501437

S. Garfinkel, PGP: Pretty Good Privacy, O.Reilly & Associates 1995,ISBN 1-56592-098-8.

S. Basagni, K. Herrin, E. Rosti and Danilo Bruschi, .Secure Pebblenets.,ACM 2001.
http://dx.doi.org/10.1145/501416.501438

D. Balfanz, D. K. Smetters, P. Stewart and H. Chi Wong, .Talking To Strangers: Authentication in Ad-Hoc Wireless Networks., Internet Society, Conference Proceeding of NDSS Conference 2002.

Journal of Computer Science and Information Technologies, Vol. 4 (6) , 2013, 974-978 Chennai, India

Roy, B. (2005). An overview of MCDA techniques today: paradigms and challenges. In: Figueira, J., Greco, S. and Ehrgott, M. (eds) Multiple criteria decision analysis: state of the art surveys.

http://www.ncsu.edu/nrli/decision-making/MCDA.php.

Butler J, Olson DL. Comparison of centroid and simulation approaches for selection sensitivity analysis. Journal of Multi-Criteria Decision Analysis 1999;8:146–61.
http://dx.doi.org/10.1002/(sici)1099-1360(199905)8:3%3C146::aid-mcda238%3E3.3.co;2-6

Jia J, Fischer GW, Dyer JS. Attribute weighting method and decision quality in the presence of response error: a simulation study. Journal of Behavioral Decision Making 1998;11:85–105.
http://dx.doi.org/10.1002/(sici)1099-0771(199806)11:2%3C85::aid-bdm282%3E3.0.co;2-k

StillwellWG, Seaver DA, EdwardsW. A comparison of weight approximation techniques in multiattribute utility decision making. Organization Behavior and Human Decision Processes 1981;28:62–77.
http://dx.doi.org/10.1016/0030-5073(81)90015-5

Network Simulator NS2 http://www.isi.edu/nsnam/ns/.

AlZabin, N., Mesleh, A., Hamed, S., Massaadeh, S., AlHeyasat, O., AlQaisi, A., A QoS based DSR routing protocol for MANETs using bandwidth, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp. 151-156.
http://dx.doi.org/10.15866/irecap.v4i5.3702

da Silva, E., e Silva, R.F., Albini, L.C.P., Security through virtualization on mobile ad hoc networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (4), pp. 270-275.

Enshaei, M., Hanapi, Z.M., Othman, M., A review: Mobile Ad Hoc networks challenges, attacks, security, vulnerability and routing protocols, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp. 168-179.
http://dx.doi.org/10.15866/irecap.v4i5.3001

Pushparaj, R., Dinakaran, M., A location based-energy aware routing approach for mobile Ad Hoc networks, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (4), pp. 114-123.
http://dx.doi.org/10.15866/irecap.v4i4.3106

Ambika, I., Eswaran, P., Improved token based resource allocation technique for multi-service flows in MANET, (2013) International Review on Computers and Software (IRECOS), 8 (6), pp. 1489-1496.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize