Abstract
Many public key infrastructure (PKI) approaches have been proposed in the recent years to secure mobile ad hoc networks (MANETs). We present a new hybrid key management infrastructure, which combines the concepts of PKIs for MANET with trusted-third-party based infrastructures. In our hybrid approach, the underlying PKI is merely used to set-up initial trust of nodes in a MANET, and, thus, generate a random trust graph connecting all the nodes of the MANET. Then, MANET nodes cooperate to securely distribute trust information and symmetric keys to other nodes through the shortest trust path. The hybrid key management infrastructure enables the same security services as a normal PKI yet key establishment and node-to-node authentication, as demonstrated by our performance analysis, is substantially improved in terms of computational and communication efficiency. We also discuss the security level of the hybrid approach.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
7. References
A. J. Menezes, P. C. Van Oorschot, S. A. Vanstone. Handbook of Applied Cryptography. CRC Press. 1996
S. Capkun, L. Buttyan and J.-P. Hubaux. Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing, vol. 2, no 1, pp. 52–64, 2003.
L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, vol. 13, no.6, 1999.
H. Luo and S. Lu. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks, Technical Report TR-200030, Dept. of Computer Science, UCLA, 2000.
H. Luo, P. Zerfos, J. Kong, S. Lu and L. Zhang. Self-Securing Ad Hoc Wireless Networks. 7th International Symposium on Computers and Communications. 2002.
M. Bechler, H.-J. Hof, D. Kraft, F. Pählke and L. Wolf. A Cluster-Based Security Architecture for Ad Hoc Networks. IEEE Infocom 2004.
E. C. H. Ngai, M. R. Lyu. Trust-and Clustering-Based Authentication Services in Mobile Ad Hoc Networks. ICDCSW’04 Workshops-W4: MDC. 2004.
L. Venkatraman and D. P. Agrawal. A Novel Authentication Scheme for Ad hoc Networks. WCNC 2000, pp. 1268–1273, vol.3.
The MSDN Library. http://msdn.microsoft.com/library/default.asp.
The Rijndael Page. http://www.esat.kuleuven.ac.be/∼rijmen/rijndael/.
P. Michiardi and R. Molva. Core: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. Communication and Multimedia Security Conference. 2002
A.B. MCDonald and T.F. Znati. A Mobility-Based Framework for Adaptive Clustering in Wireless Ad Hoc Networks. IEEE JSAC, 1999.
C. Kaufman, R. Perlman and M. Speciner. Network Security: Private Communication in a Public World. Prentice Hall PTR, 2002.
Network Associates, Inc. An Introduction to Cryptography.
L. Martucci, C. Schweitzer, Y. Regina Venturini, T. C. Carvalho, W. Ruggiero. “A Trust-Based Security Architecture for Small and Medium-Sized Mobile Ad Hoc Networks”. The Third Med-Hoc-Net Workshop, 2004.
K. Hoeper and G. Gong. Models of Authentication in Ad Hoc Networks and Their Related Network Properties. Technical Report, University of Waterloo, CACR 2004-03.
S. Capkun, J.-P. Hubaux and L. Buttyan. Mobility helps security in ad hoc networks. In Proc. MobiHoc’03, 2003.
M. Elhdhili, L. B. Azzouz, F. Kamoun. A Totally Distributed Cluster Based Key Management Model for Ad Hoc Networks. The Third Med-Hoc-Net Workshop. 2004.
J.K. Doyle and J.E. Graver. Mean distance in a graph. Discrete Mathematics Vol. 17, Issue 2, pp. 147–154, 1977.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 International Federation for Information Processing
About this paper
Cite this paper
Sanchez, D.S., Baldus, H. (2006). Hybrid Key Management for Mobile Ad Hoc Networks. In: Al Agha, K., Guérin Lassous, I., Pujolle, G. (eds) Challenges in Ad Hoc Networking. Med-Hoc-Net 2005. IFIP International Federation for Information Processing, vol 197. Springer, Boston, MA. https://doi.org/10.1007/0-387-31173-4_37
Download citation
DOI: https://doi.org/10.1007/0-387-31173-4_37
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-31171-5
Online ISBN: 978-0-387-31173-9
eBook Packages: Computer ScienceComputer Science (R0)