HKDS: A Hierarchical Key Distribution Scheme for Wireless Ad Hoc Network

نویسندگان

  • Kakali Chatterjee
  • Lalita Priya
چکیده

Wireless ad hoc networks are very popular in many areas such as border area protection, rescue operations etc. These networks suffer security problems due to their infrastructure less architecture. Attacks like passive eavesdropping, impersonation, replay etc. can be easily performed in such networks. Also the devices used in such networks are mostly resource constrained devices. Hence highly secured complex cryptographic algorithm cannot implement in such devices. This paper proposes a two level hierarchical key distribution scheme (HKDS) for wireless ad hoc networks. In the first level the secret key is distributed among the cluster heads using knapsack algorithm. In the second level, the secret shares generated by cluster head using Chinese Remainder Theorem (CRT) scheme is distributed among the nodes of the cluster. After that a mutual authentication scheme is introduced through which the node and the cluster head will mutually authenticate themselves and generate the secret session key for communication.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

A Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks

Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Preloaded Key Distribution Schemes for Ad Hoc Networks

We investigate the applicability of key pre-distribution schemes for securing ad hoc networks. While most key pre-distribution (KPD) schemes satisfy the fundamental requirements to serve as an enabler for ad hoc network security, there are some additional desired properties which would significantly enhance their appeal for practical deployments. This paper addresses many such desired propertie...

متن کامل

Authenticated and Efficient Key Management for Wireless Ad Hoc Networks

In this paper we present a key management protocol for wireless ad hoc multi-hop networks. Two objectives were crucial in our design: (1) distributed trust to ensure robustness, and (2) strong authentication to prevent the battery drain attack. We achieve distributed trust by presenting a hierarchical and distributed public key infrastructure for ad hoc networks. Our PKI has been designed to ma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2018