By Topic

A hierarchical and decentralized key establishment scheme for end-to-end security in heterogeneous networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Pillai, K.R.C. ; Dept. of Comput. Sci. & Eng., N.S.S. Coll. of Eng., Palakkad, India ; Sebastain, M.P.

The integration of different wireless networks such as cellular networks, WLANs and MANETs with a core IP network is an extremely complex and challenging task, involving issues at all layers of the protocol stack. It is expected that the future advancements in such an integrated heterogeneous network technology would provide a variety of services to the network users. For achieving the end- to- end security in a heterogeneous network environment, an integrated and robust security framework is to be developed and for that an efficient and decentralized key establishment scheme is a fundamental requirement. This paper proposes a hierarchical and decentralized key establishment scheme applying the principles of symmetric polynomials for the futuristic heterogeneous network environment.

Published in:

Internet Multimedia Services Architecture and Applications (IMSAA), 2009 IEEE International Conference on

Date of Conference:

9-11 Dec. 2009