A Study of Key Management and Location Management for Mobile Networks

نویسندگان

  • Jun ANZAI
  • Tsutomu Matsumoto
  • Junji Shikata
  • Seiichiro Kagei
  • Tomoharu Nagao
چکیده

Finally, I want to express my deepest gratitude to my wife Chikako, my daughter Tsugumi, and my son Tenga for their support and encouragemet. Abstract The subjects of this thesis are secure key management and secure location management for mobile nodes on wireless mobile networks. Recently, mobile networks become increasingly popular with the widespread availability of cellular phones and notebook PC's. Moreover new mobile networks are appearing, for example autonomous and flexible networks as typified by ad-hoc / mesh networks and ubiquitous computing / networks as typified by sensor networks and radio frequency identification (RFID) systems. On wireless mobile networks, attackers are easy to eavesdrop and connect communication channels. Therefore it is important to prevent attacks in comparison to traditional wired networks. Cryptography is an essential tool in information security. Symmetric cryptography uses the same key (symmetric key) for message encryption and message decryption. In case that a valid user Alice has a symmetric key secretly, Alice can securely share a secret message with another user Bob whom Alice selects by giving the symmetric key to Bob secretly. Also, asymmetric cryptography uses a key (public key) to encrypt a secret message and uses another key (private key) to decrypt an encrypted secret message. According to publish a public key, the corresponding private key holder can decrypt encrypted messages that other users encrypt using the public key. In general, public key infrastructure (PKI) that a trusted third party certificates an identity of a public key is used for knowing whose public key. Such techniques (symmetric key sharing and PKI) are called " key management ". Thus cryptography requires secure key management. Here, mobile networks have significant features that are different from traditional wired networks, and these features are 1) dynamic change of network topology, 2) no authorities and so on. Consequently, there are still many key management problems. On the other hand, many mobile nodes are always moving on mobile networks. Therefore it is important that network managers and service providers obtain location information of mobile nodes. As location measurement technology, there are techniques that calculate a location using a difference time between radio waves as typified by global positioning system (GPS) and techniques that confirm a location using information, which can be obtained in a specific location, as typified by RFID and beacons. Newly, location-based services (LBSs), which depend on geographical locations of mobile nodes, receive mach attention on ubiquitous …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Design of a Reliable Facility Location Model for Health Service Networks

This paper proposes a novel facility location model for health service network design by considering different key elements including the reliability aspects, service capacity, congestion, service quality, surrounding public infrastructures, geographical accessibility and several types of cost such as investment, transportation and operational costs. We formulate the problem as a robust scenari...

متن کامل

Designing the Attitude toward Advertising Model through Mobile Social Networks

The aim of this research is to help advance a better understanding of digital advertising innovation adoption, consumer acceptance of customized advertising, and the influence of customized advertising on product purchase intent via a mobile social network. To this end, two types of questionnaires, including an open questionnaire filled up by 16 experts and university professors was designed to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005