HKDS: A Hierarchical Key Distribution Scheme for Wireless Ad Hoc Network
نویسندگان
چکیده
Wireless ad hoc networks are very popular in many areas such as border area protection, rescue operations etc. These networks suffer security problems due to their infrastructure less architecture. Attacks like passive eavesdropping, impersonation, replay etc. can be easily performed in such networks. Also the devices used in such networks are mostly resource constrained devices. Hence highly secured complex cryptographic algorithm cannot implement in such devices. This paper proposes a two level hierarchical key distribution scheme (HKDS) for wireless ad hoc networks. In the first level the secret key is distributed among the cluster heads using knapsack algorithm. In the second level, the secret shares generated by cluster head using Chinese Remainder Theorem (CRT) scheme is distributed among the nodes of the cluster. After that a mutual authentication scheme is introduced through which the node and the cluster head will mutually authenticate themselves and generate the secret session key for communication.
منابع مشابه
Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملA Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks
Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملPreloaded Key Distribution Schemes for Ad Hoc Networks
We investigate the applicability of key pre-distribution schemes for securing ad hoc networks. While most key pre-distribution (KPD) schemes satisfy the fundamental requirements to serve as an enabler for ad hoc network security, there are some additional desired properties which would significantly enhance their appeal for practical deployments. This paper addresses many such desired propertie...
متن کاملAuthenticated and Efficient Key Management for Wireless Ad Hoc Networks
In this paper we present a key management protocol for wireless ad hoc multi-hop networks. Two objectives were crucial in our design: (1) distributed trust to ensure robustness, and (2) strong authentication to prevent the battery drain attack. We achieve distributed trust by presenting a hierarchical and distributed public key infrastructure for ad hoc networks. Our PKI has been designed to ma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 20 شماره
صفحات -
تاریخ انتشار 2018